ajpc500 / NimlineWhispers2View external linksLinks
A tool for converting SysWhispers2 syscalls for use with Nim projects
☆125Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for NimlineWhispers2
Users that are interested in NimlineWhispers2 are comparing it to the libraries listed below
Sorting:
- Get fresh Syscalls from a fresh ntdll.dll copy☆236Jan 28, 2022Updated 4 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Jan 14, 2022Updated 4 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Jun 2, 2022Updated 3 years ago
- D/Invoke implementation in Nim☆103Jun 8, 2022Updated 3 years ago
- A collection of offensive Nim example code☆74Dec 21, 2021Updated 4 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆166Sep 10, 2021Updated 4 years ago
- A Nim implementation of reflective PE-Loading from memory☆299Sep 5, 2024Updated last year
- Nim Library for Offensive Security Development☆198Sep 4, 2023Updated 2 years ago
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆813Jan 20, 2023Updated 3 years ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆488Feb 24, 2023Updated 2 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆127May 24, 2022Updated 3 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Oct 14, 2022Updated 3 years ago
- COFF and BOF Loader written in Nim☆176Aug 1, 2022Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆141Jan 9, 2022Updated 4 years ago
- ☆152Jan 6, 2023Updated 3 years ago
- A quick example of the Hells Gate technique in Nim☆96Aug 11, 2021Updated 4 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Aug 1, 2022Updated 3 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)☆321Nov 9, 2021Updated 4 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆62Mar 19, 2021Updated 4 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆187Jul 21, 2022Updated 3 years ago
- Remove API hooks from a Beacon process.☆283Sep 18, 2021Updated 4 years ago
- Your syscall factory☆126Jan 13, 2026Updated last month
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- C# Reflective loader for unmanaged binaries.☆447Jan 25, 2023Updated 3 years ago
- A shellcode function to encrypt a running process image when sleeping.☆340Sep 11, 2021Updated 4 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆243Jan 4, 2023Updated 3 years ago
- PE Crypter written in Nim☆101Mar 25, 2021Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆93Mar 8, 2023Updated 2 years ago
- Sleep Obfuscation☆814Dec 3, 2023Updated 2 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,398Nov 22, 2023Updated 2 years ago
- Beacon Object File Loader☆294Dec 3, 2023Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆221Mar 30, 2022Updated 3 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆220May 3, 2023Updated 2 years ago
- A collection of weird ways to execute unmanaged code in .NET☆174May 4, 2021Updated 4 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.☆771Dec 21, 2022Updated 3 years ago