NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.
☆31Jan 21, 2024Updated 2 years ago
Alternatives and similar repositories for NimReflectiveLoader
Users that are interested in NimReflectiveLoader are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated 2 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆55Sep 19, 2023Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- A tiny macro library for protecting sensitive strings in compiled binaries☆40Oct 8, 2024Updated last year
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- ☆150Mar 22, 2024Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated 2 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Jun 24, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- malware written for educational purposes☆73Dec 31, 2025Updated 4 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 4 months ago
- A library of string validators and sanitizers.☆14Updated this week
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆203Mar 26, 2025Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆47Jan 10, 2024Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Jul 27, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Build and packaging nimble binary package for Windows, macOS and Linux.☆13Apr 9, 2026Updated last month
- It's ooey and gooey. No clue what this really is aside from a GUI framework basis?☆14Oct 1, 2024Updated last year
- ☆12Jun 5, 2024Updated last year
- Lifetime AMSI bypass☆676Sep 26, 2023Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆147Feb 1, 2026Updated 3 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆203Dec 27, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆193Mar 4, 2024Updated 2 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Indirect syscalls + DInvoke made simple.☆97Dec 24, 2024Updated last year
- A simple Nim GTK4 drawing and design tool☆11Oct 15, 2023Updated 2 years ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆186Nov 10, 2023Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 3 years ago
- Grapheme aware string handling (Unicode tr29)☆11Sep 19, 2024Updated last year