D3Ext / NimbusLinks
Shellcode loader with evasion capabilities written in Nim
☆14Updated 10 months ago
Alternatives and similar repositories for Nimbus
Users that are interested in Nimbus are comparing it to the libraries listed below
Sorting:
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆43Updated last year
- C# havoc implant☆101Updated 2 years ago
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Updated 2 years ago
- ☆53Updated 3 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆14Updated last year
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Nim Shellcode Injector☆15Updated 4 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆87Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated 2 years ago
- Custom Python shellcode encryptor and obfuscator☆14Updated 4 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 5 years ago
- Reasonably undetected shellcode stager and executer.☆37Updated 6 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated 11 months ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆30Updated last year
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- A simple website to act as a store for havoc modules and extensions☆28Updated 10 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆14Updated 2 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆29Updated 6 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 3 years ago
- ☆22Updated 6 months ago
- Duplicate not owned Token from Running Process☆73Updated 2 years ago