VVX7 / nicodemus
A cross-platform Nim implant for Prelude Operator
☆32Updated 3 years ago
Alternatives and similar repositories for nicodemus:
Users that are interested in nicodemus are comparing it to the libraries listed below
- SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique☆90Updated 2 years ago
- A library for interacting with Windows through SMB written in Nim.☆15Updated 3 months ago
- a simple backdoor in Nim☆19Updated 3 years ago
- ☆41Updated last year
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆33Updated 3 years ago
- Nim version of MDSec's Parallel Syscall PoC☆125Updated 3 years ago
- Run python from a single exe☆35Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- ShellcodeFluctuation PoC ported to Nim☆77Updated 2 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆94Updated 2 years ago
- A collection of offensive Nim example code☆75Updated 3 years ago
- A quick example of the Hells Gate technique in Nim☆95Updated 3 years ago
- ☆46Updated 4 years ago
- A simple Nim stager (w/ fiber execution)☆17Updated 3 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- ☆14Updated 3 years ago
- ☆12Updated 4 years ago
- all credits go to @mgeeky☆64Updated 3 years ago
- A collection of presentations and other contributions I have made to conferences.☆37Updated 8 months ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- ☆19Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆38Updated 7 months ago
- pypykatz plugin for volatility3 framework☆40Updated last year
- Small utility package for manipulating Windows process tokens☆26Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆51Updated last year