DeEpinGh0st / sRDI-nimView external linksLinks
A nim implementation of sRDI
☆20Oct 18, 2023Updated 2 years ago
Alternatives and similar repositories for sRDI-nim
Users that are interested in sRDI-nim are comparing it to the libraries listed below
Sorting:
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 8 months ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated 11 months ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- ☆15Nov 19, 2023Updated 2 years ago
- ☆18Nov 23, 2023Updated 2 years ago
- Reflective DLL self-loading as a library☆21May 3, 2025Updated 9 months ago
- ☆13Jul 5, 2022Updated 3 years ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated 10 months ago
- Nim process hollowing loader☆62Jul 22, 2025Updated 6 months ago
- XXST-白加黑辅助挖掘工具,全程静默运行不影响正常使用☆17Apr 12, 2024Updated last year
- 利用chrome扩展 dump 浏览器cookie https://saucer-man.com/information_security/787.html☆15Sep 9, 2021Updated 4 years ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆40Oct 8, 2024Updated last year
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 2 months ago
- 一个勒索程序模拟脚本☆30Mar 8, 2024Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated 11 months ago
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Apr 29, 2024Updated last year
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- A process injection technique using only thread context manipulation☆41Dec 18, 2023Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆186Mar 4, 2024Updated last year
- Tool developed using csharp (.net 4.5) for compressing and encrypting files to shorten transfer times. Supports multi-file compression an…☆14Feb 15, 2024Updated 2 years ago
- SOCKS, HTTP and Reverse Proxy server based on .NET☆16Oct 28, 2024Updated last year
- SSDG 基于Social规则的账号|密码|口令字典生成工具☆16Jan 10, 2025Updated last year
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- Remote Template Injection Toolkit☆48Apr 7, 2024Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 weeks ago
- ☆14Jan 15, 2025Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆14Jul 28, 2023Updated 2 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- apache-shiro-exploit☆31Nov 16, 2023Updated 2 years ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆296Jul 31, 2024Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆136Aug 31, 2025Updated 5 months ago
- 二维码钓鱼☆43Aug 24, 2023Updated 2 years ago
- A high performance Nim implementation of a Cyclic Polynomial Hash, aka BuzHash, and the Rabin-Karp algorithm☆16Apr 2, 2019Updated 6 years ago
- 子域名收集工具☆18Mar 26, 2025Updated 10 months ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Feb 23, 2024Updated last year
- 用友 nc 系列密码解密☆61Apr 7, 2023Updated 2 years ago
- Heavily obfuscated ASP web shell generation tool.☆175Apr 26, 2024Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆164Jan 4, 2024Updated 2 years ago