A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educational purposes only.
☆120Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for Nim-Reverse-Shell
Users that are interested in Nim-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆52Mar 1, 2024Updated 2 years ago
- Simple HTTP listener for security testing☆20Oct 7, 2022Updated 3 years ago
- 🤖 The Modern Port Scanner 🤖☆22Jul 1, 2021Updated 4 years ago
- Hash algorithms in Nim☆15Updated this week
- testrunner et al☆17Jul 14, 2025Updated 7 months ago
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆33Apr 15, 2025Updated 10 months ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- ☆14May 14, 2022Updated 3 years ago
- Ergonomic GMP Integers for Nim☆10Sep 1, 2023Updated 2 years ago
- Bookmarklet to find endpoints easily with one click☆79May 19, 2024Updated last year
- ☆16Jun 15, 2025Updated 8 months ago
- A teminal othello (reversi) in Nim.☆11May 2, 2021Updated 4 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- nim playground using monaco editor and wandbox api☆12Oct 25, 2024Updated last year
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- ☆16Aug 25, 2025Updated 6 months ago
- minimal mass file renamer☆12Jan 26, 2022Updated 4 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- An implementation of perceptual hash in Nim language☆10Oct 12, 2022Updated 3 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- Official Nim port of Sqids. Generate short unique IDs from numbers.☆13Nov 26, 2023Updated 2 years ago
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- ☆12Nov 12, 2023Updated 2 years ago
- Tampermonkey Script - Amazon Giveaways☆15Dec 6, 2018Updated 7 years ago
- upcoming concurrent library for Nim☆11Apr 25, 2021Updated 4 years ago
- A library of string validators and sanitizers.☆13Feb 6, 2026Updated last month
- A lightweight remote access trojan in Rust☆31Jun 28, 2024Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- Browse the web entirely over SMS — no apps required.☆13Oct 6, 2014Updated 11 years ago
- qFlipper — desktop application for updating Flipper Zero firmware via PC☆16Mar 12, 2022Updated 3 years ago
- Strided indexing and slicing for Nim☆12Dec 11, 2022Updated 3 years ago
- ☆16Jul 7, 2024Updated last year
- Eclipse is a python stealer targeting windows operating system's, based on asynchronous module, with advanced features !☆12Nov 26, 2024Updated last year
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Tightly packed 1d and 2d bit arrays.☆13Nov 25, 2025Updated 3 months ago
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- Reverse shell that can bypass windows defender detection☆171Feb 3, 2024Updated 2 years ago