S3cur3Th1sSh1t / nim-strencLinks
string encryption in Nim
☆20Updated last year
Alternatives and similar repositories for nim-strenc
Users that are interested in nim-strenc are comparing it to the libraries listed below
Sorting:
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆13Updated 10 months ago
- Cobalt Strike notifications via NTFY.☆13Updated 8 months ago
- ELF Beacon Object File (BOF) Template☆19Updated 7 months ago
- ☆25Updated 3 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated last year
- Beacon Object Files used for Cobalt Strike☆19Updated last year
- Unix Process hollowing in rust☆22Updated 6 months ago
- ☆18Updated 6 months ago
- A simple to use single-include Windows API resolver☆21Updated 11 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 3 months ago
- ☆26Updated 4 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A lexer and parser for Sleep☆20Updated last month
- ☆48Updated 4 years ago
- ☆18Updated last month
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 11 months ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Python3 tool to perform password spraying using RDP☆17Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago