S3cur3Th1sSh1t / nim-strenc
string encryption in Nim
☆17Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for nim-strenc
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆26Updated last week
- Example of using Sleep to create better named pipes.☆41Updated last year
- Cobalt Strike notifications via NTFY.☆13Updated last month
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Bunch of BOF files☆23Updated 8 months ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆18Updated 9 months ago
- ☆47Updated last year
- BOF for C2 framework☆40Updated this week
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆18Updated 4 months ago
- Sniffing files generator☆19Updated this week
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- Hooked create process injection for meterpreter☆23Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆4Updated 6 months ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated 8 months ago
- Asynchronous NFSv3 client in pure Python☆23Updated 3 weeks ago
- ☆21Updated 6 months ago
- A simple to use single-include Windows API resolver☆17Updated 4 months ago
- Collect Windows telemetry for Maldev☆36Updated this week
- Unhook Ntdll.dll, Go & C++.☆14Updated 3 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆24Updated 8 months ago
- A small example of loading BOFs in Python with pure reflection☆17Updated last year
- Smuggle a file to a user's browser☆18Updated 2 years ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year