NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.
☆30Jan 21, 2024Updated 2 years ago
Alternatives and similar repositories for NimReflectiveLoader
Users that are interested in NimReflectiveLoader are comparing it to the libraries listed below
Sorting:
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated last year
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆40Oct 8, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Jul 27, 2023Updated 2 years ago
- ☆150Mar 22, 2024Updated last year
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆99Oct 13, 2022Updated 3 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆409Jan 11, 2026Updated last month
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- Lifetime AMSI bypass☆671Sep 26, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆190Mar 4, 2024Updated last year
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Spawn SYSTEM shells like a PRO!☆10Mar 8, 2023Updated 2 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- Build and packaging nimble binary package for Windows, macOS and Linux.☆12Updated this week
- A simple Nim GTK4 drawing and design tool☆11Oct 15, 2023Updated 2 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Oct 14, 2022Updated 3 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆293Jul 15, 2023Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51May 8, 2024Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆203Mar 26, 2025Updated 11 months ago