MythicAgents / Nimplant
A cross-platform implant written in Nim
☆168Updated 6 months ago
Related projects: ⓘ
- SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique☆88Updated 2 years ago
- ☆228Updated this week
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆161Updated 3 years ago
- Nim Library for Offensive Security Development☆186Updated last year
- COFF and BOF Loader written in Nim☆164Updated 2 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆206Updated 2 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆265Updated last year
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆230Updated 2 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆262Updated 4 months ago
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆117Updated 2 years ago
- grim reaper c2☆333Updated last year
- ☆154Updated 2 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆220Updated 2 years ago
- Executes position independent shellcode from an encrypted zip☆300Updated 3 years ago
- Koppeling x Metatwin x LazySign☆200Updated 3 years ago
- ☆189Updated 4 years ago
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆176Updated last year
- A little tool to play with Outlook☆202Updated 2 years ago
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆189Updated 6 months ago
- Pass the Hash to a named pipe for token Impersonation☆291Updated 9 months ago
- ☆310Updated this week
- A collection of offensive Nim example code☆73Updated 2 years ago
- ☆164Updated 3 years ago
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆258Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆212Updated last year
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆312Updated 4 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆319Updated 2 years ago
- Automated compiler obfuscation for nim☆131Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆206Updated 3 years ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆449Updated last year