1d8 / bstryLinks
Nimlang "Ransomware" Malware For Linux
☆22Updated 5 years ago
Alternatives and similar repositories for bstry
Users that are interested in bstry are comparing it to the libraries listed below
Sorting:
- a simple backdoor in Nim☆19Updated 4 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique☆90Updated 3 years ago
- Interactive Windows Reverse Shell Server/Client☆42Updated 4 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆86Updated 4 years ago
- PE Crypter written in Nim☆101Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆45Updated 3 years ago
- A cross-platform implant written in Nim☆175Updated last year
- WIP shellcode loader in nim with EDR evasion techniques☆221Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆92Updated 4 years ago
- Run python from a single exe☆35Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Updated 2 years ago
- Nim Library for Offensive Security Development☆198Updated 2 years ago
- A collection of offensive Nim example code☆74Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆236Updated 4 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Updated 6 years ago
- grim reaper c2☆346Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- Simple reverse shell to avoid Win 11 defender detection☆122Updated 4 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆109Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆41Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆60Updated 4 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Updated 4 years ago
- A quick example of the Hells Gate technique in Nim☆96Updated 4 years ago
- Malicious Shortcut(.lnk) Generator☆86Updated 7 years ago