S3cur3Th1sSh1t / nim-strencLinks
string encryption in Nim
☆20Updated last year
Alternatives and similar repositories for nim-strenc
Users that are interested in nim-strenc are comparing it to the libraries listed below
Sorting:
- Unix Process hollowing in rust☆22Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35Updated last year
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 10 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago
- ☆47Updated 2 years ago
- Cobalt Strike notifications via NTFY.☆15Updated last year
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆37Updated 6 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- ☆23Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31Updated 7 months ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Updated last month
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 5 months ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- An In-memory Embedding of CPython☆31Updated 4 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28Updated last year
- ☆37Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12Updated 2 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Updated last year
- ☆61Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 10 months ago