A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educational purposes only.
☆121Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for Nim-Reverse-Shell
Users that are interested in Nim-Reverse-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆54Mar 1, 2024Updated 2 years ago
- Simple HTTP listener for security testing☆21Oct 7, 2022Updated 3 years ago
- 🤖 The Modern Port Scanner 🤖☆23Jul 1, 2021Updated 4 years ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- Browse the web entirely over SMS — no apps required.☆14Oct 6, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆25Jan 3, 2025Updated last year
- Go Ransomware (YouTube)☆22Nov 17, 2022Updated 3 years ago
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆33Apr 15, 2025Updated last year
- Self-updatable RAT + C2 server + client.☆16Jun 24, 2024Updated last year
- Hash algorithms in Nim☆15Apr 3, 2026Updated 2 weeks ago
- qFlipper — desktop application for updating Flipper Zero firmware via PC☆17Mar 12, 2022Updated 4 years ago
- Bookmarklet to find endpoints easily with one click☆80May 19, 2024Updated last year
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆18Oct 27, 2019Updated 6 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Reverse shell that can bypass windows defender detection☆173Mar 31, 2026Updated 2 weeks ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆24Oct 24, 2024Updated last year
- Generate common Reverse Shells for Pentesting☆45May 23, 2021Updated 4 years ago
- testrunner et al☆17Apr 9, 2026Updated last week
- ☆16Dec 15, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 3 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- malware written for educational purposes☆70Dec 31, 2025Updated 3 months ago
- Xfinity / Comcast Wordlist Generator☆79Mar 24, 2023Updated 3 years ago
- minimal mass file renamer☆12Jan 26, 2022Updated 4 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆168May 28, 2025Updated 10 months ago
- CVE-2024-57727☆13Jan 17, 2025Updated last year
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A teminal othello (reversi) in Nim.☆11May 2, 2021Updated 4 years ago
- A library of string validators and sanitizers.☆14Mar 3, 2026Updated last month
- Powershell tool to automate Active Directory enumeration.☆1,296Updated this week
- ☆16Jun 15, 2025Updated 10 months ago
- ☆16Aug 25, 2025Updated 7 months ago
- Autofill Phishing☆87Aug 25, 2025Updated 7 months ago
- nim playground using monaco editor and wandbox api☆12Oct 25, 2024Updated last year