adamsvoboda / nim-loaderLinks
WIP shellcode loader in nim with EDR evasion techniques
☆221Updated 3 years ago
Alternatives and similar repositories for nim-loader
Users that are interested in nim-loader are comparing it to the libraries listed below
Sorting:
- A BOF to automate common persistence tasks for red teamers☆291Updated 2 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆239Updated 3 years ago
- A basic emulation of an "RPC Backdoor"☆243Updated 3 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆177Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆183Updated 2 years ago
- BOF combination of KillDefender and Backstab☆171Updated 2 years ago
- ErebusGate for Nim Bypass AV/EDR☆164Updated 3 years ago
- A BOF to determine Windows Defender exclusions.☆253Updated 2 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆221Updated 4 years ago
- AV/EDR evasion via direct system calls.☆108Updated 2 years ago
- ☆246Updated 3 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆299Updated 4 years ago
- PowerShell script to generate "proxy" counterparts to easily perform DLL Sideloading☆130Updated 6 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆146Updated 3 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆239Updated 2 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆236Updated 3 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆188Updated 4 years ago
- Nim Payload Generation☆63Updated 2 years ago
- ☆161Updated 2 years ago
- Automated compiler obfuscation for nim☆140Updated 3 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆182Updated 2 years ago
- Useful Cobalt Strike BOFs found or used during engagements☆144Updated 2 years ago
- DLL Hijack Search Order Enumeration BOF☆151Updated 4 years ago
- A Nim implementation of reflective PE-Loading from memory☆296Updated last year
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆139Updated 3 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆227Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆310Updated 3 years ago