S3cur3Th1sSh1t / OffensiveNimView external linksLinks
My experiments in weaponizing Nim (https://nim-lang.org/)
☆17Mar 1, 2023Updated 2 years ago
Alternatives and similar repositories for OffensiveNim
Users that are interested in OffensiveNim are comparing it to the libraries listed below
Sorting:
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 3 months ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- ☆14Sep 2, 2021Updated 4 years ago
- ☆19Sep 17, 2025Updated 4 months ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- An addon to import users from active directory to gophish☆19Mar 22, 2022Updated 3 years ago
- Various shell code I have written☆17Oct 9, 2020Updated 5 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Sep 25, 2020Updated 5 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Sep 28, 2022Updated 3 years ago
- 一款强大的内网信息收集工具,支持文件、文件夹、文件内容、命令、注册表、进程、mimikatz命令、dpapi、最近访问收集,且支持定制化配置,只需更新配置文件,定义收集规则,即可开启对各类浏览器、remote工具、聊天软件进行凭据、信息收集☆22Oct 16, 2022Updated 3 years ago
- Github repository which contains a functional exploit for CVE-2021-39165☆22Jul 13, 2022Updated 3 years ago
- ☆13May 24, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆235Oct 18, 2022Updated 3 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 5 years ago
- CobaltStrike Malleable Profile☆23May 16, 2022Updated 3 years ago
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆25Mar 7, 2023Updated 2 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Runs programs as TrustedInstaller☆49Jul 1, 2019Updated 6 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- PhishingExploit☆24Sep 3, 2018Updated 7 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated last month
- Modified code so that we don´t need to rely on CAB archives☆104Sep 22, 2021Updated 4 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆236Jan 28, 2022Updated 4 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Apr 26, 2025Updated 9 months ago
- Shellcode injector using direct syscalls☆123Aug 17, 2020Updated 5 years ago
- ☆72Aug 2, 2022Updated 3 years ago