D3Ext / NimbusLinks
Shellcode loader with evasion capabilities written in Nim
☆13Updated 5 months ago
Alternatives and similar repositories for Nimbus
Users that are interested in Nimbus are comparing it to the libraries listed below
Sorting:
- ShootCutMe an .LNK file creator tool for redteamer☆13Updated 9 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆14Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆42Updated 9 months ago
- Beacon Object File implementation of Yaxser's Backstab☆15Updated 3 years ago
- Simple Shellcode Loader tool☆26Updated 2 years ago
- Cobalt Strike Aggressor scripts☆9Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated 11 months ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 3 years ago
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆56Updated 2 years ago
- A simple website to act as a store for havoc modules and extensions☆27Updated 5 months ago
- Nim Shellcode Injector☆15Updated 4 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Tool to start processes as SYSTEM using token duplication☆39Updated 4 years ago
- ☆25Updated 3 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆16Updated 8 months ago
- ☆26Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆33Updated last year
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆27Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆82Updated last year
- Find kernel32 base and API addresses. Simple C++ implementation☆24Updated 3 years ago
- ☆48Updated 2 years ago
- Erebus is a payload generator written in Nim.☆16Updated 2 years ago