S3cur3Th1sSh1t / Nim_DInvoke
D/Invoke implementation in Nim
☆98Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Nim_DInvoke
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆110Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆138Updated 2 years ago
- ShellcodeFluctuation PoC ported to Nim☆75Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆51Updated last year
- Implant drop-in for EDR testing☆127Updated 11 months ago
- ☆61Updated 2 years ago
- Simple BOF to read the protection level of a process☆104Updated last year
- ☆133Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆86Updated 2 years ago
- Patch AMSI and ETW in remote process via direct syscall☆77Updated 2 years ago
- A newer iteration of TitanLdr with some newer hooks, and design. A generic user defined reflective DLL I built to prove a point to Mudge …☆159Updated last year
- PoC XLL builder in Python/Nim☆40Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆85Updated 2 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆87Updated last year
- Find DLLs with RWX section☆75Updated last year
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆118Updated 2 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆97Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆130Updated last month
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆87Updated 2 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆90Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆76Updated 2 years ago
- Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.☆20Updated 2 years ago
- ☆139Updated last year
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆83Updated last year
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆94Updated last year
- COFF and BOF Loader written in Nim☆168Updated 2 years ago