My experiments in weaponizing Nim (https://nim-lang.org/)
☆14Nov 30, 2021Updated 4 years ago
Alternatives and similar repositories for OffensiveNim
Users that are interested in OffensiveNim are comparing it to the libraries listed below
Sorting:
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Collection of shellcode injection and execution techniques☆18Aug 21, 2025Updated 6 months ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- 通过OXID解析器获取Windows远程主机上网卡地址☆25Aug 8, 2022Updated 3 years ago
- Custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1)☆24Mar 3, 2023Updated 3 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- improved shellcode template for b1tg/rust-windows-shellcode☆29May 12, 2021Updated 4 years ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆35Dec 8, 2021Updated 4 years ago
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Weaponising C# - Fundamentals Training Content☆70May 11, 2021Updated 4 years ago
- ☆10Oct 9, 2024Updated last year
- 互联网侧调试访问者信息的工具☆34May 21, 2024Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆88Mar 2, 2022Updated 4 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Import Mitre Att&ck into Neo4j database☆39Dec 8, 2022Updated 3 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Jan 15, 2022Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Feb 4, 2026Updated last month
- CVE-2021-33909 Sequoia☆46Sep 2, 2021Updated 4 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- CaDiCaL + neural glue variable predictions☆10Oct 21, 2020Updated 5 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- ☆48Apr 15, 2022Updated 3 years ago
- Windows Event Forwarding/Collection - A simple way to get quick, comprehensive logging for a Windows environment.☆16Jun 5, 2022Updated 3 years ago
- fanotify cron system☆21Sep 15, 2015Updated 10 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- AiCSA,Move to https://github.com/hktalent/AiCSA☆10Apr 3, 2023Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Public Key Infrastructure for IoT devices☆14Dec 7, 2022Updated 3 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- ☆11Mar 19, 2019Updated 6 years ago