SECFORCE / NimWhispers
☆11Updated 3 years ago
Alternatives and similar repositories for NimWhispers:
Users that are interested in NimWhispers are comparing it to the libraries listed below
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆20Updated last year
- Dump Teams conversations☆19Updated 3 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 3 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- ☆20Updated 10 months ago
- ☆29Updated 2 years ago
- A VSCode plugin to assist with BOF development.☆34Updated 8 months ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Updated 5 years ago
- Beacon Object Files (not Buffer Overflows)☆54Updated 2 years ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆33Updated 3 years ago
- ☆21Updated 2 years ago
- ☆43Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆17Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆25Updated 3 years ago
- Run python from a single exe☆35Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆25Updated 2 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year
- ☆28Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 10 months ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆18Updated 2 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆51Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- A simple BOF implementation of klist using Windows API☆31Updated 2 years ago