A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educational purposes only.
☆121Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for Nim-Reverse-Shell
Users that are interested in Nim-Reverse-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆56Mar 1, 2024Updated 2 years ago
- Simple HTTP listener for security testing☆20Oct 7, 2022Updated 3 years ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- Browse the web entirely over SMS — no apps required.☆13Oct 6, 2014Updated 11 years ago
- Ransomware written in go, encrypt - decrypt.☆29Apr 27, 2025Updated 11 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Go Ransomware (YouTube)☆22Nov 17, 2022Updated 3 years ago
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆33Apr 15, 2025Updated 11 months ago
- Hash algorithms in Nim☆15Mar 23, 2026Updated last week
- Eclipse is a python stealer targeting windows operating system's, based on asynchronous module, with advanced features !☆12Nov 26, 2024Updated last year
- Self-updatable RAT + C2 server + client.☆16Jun 24, 2024Updated last year
- qFlipper — desktop application for updating Flipper Zero firmware via PC☆16Mar 12, 2022Updated 4 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆17Oct 27, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tampermonkey Script - Amazon Giveaways☆15Dec 6, 2018Updated 7 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Reverse shell that can bypass windows defender detection☆172Feb 3, 2024Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- testrunner et al☆17Updated this week
- ☆16Dec 15, 2021Updated 4 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Nov 12, 2023Updated 2 years ago
- Ergonomic GMP Integers for Nim☆10Sep 1, 2023Updated 2 years ago
- 🚀 Blazing fast and Powerful Stealer, no popo made with python☆26Nov 2, 2024Updated last year
- A lightweight remote access trojan in Rust☆31Jun 28, 2024Updated last year
- malware written for educational purposes☆72Dec 31, 2025Updated 2 months ago
- Xfinity / Comcast Wordlist Generator☆78Mar 24, 2023Updated 3 years ago
- minimal mass file renamer