byt3bl33d3r / NimDllSideload
DLL sideloading/proxying with Nim!
☆163Updated last year
Related projects ⓘ
Alternatives and complementary repositories for NimDllSideload
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆138Updated 2 years ago
- Your syscall factory☆122Updated last month
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆118Updated 2 years ago
- ☆173Updated 11 months ago
- Nim Payload Generation☆59Updated last year
- COFF and BOF Loader written in Nim☆168Updated 2 years ago
- Patch AMSI and ETW☆230Updated 6 months ago
- ErebusGate for Nim Bypass AV/EDR☆159Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆279Updated last year
- Just another C2 Redirector using CloudFlare.☆78Updated 5 months ago
- Weaponized HellsGate/SigFlip☆191Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆148Updated 10 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆135Updated last week
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆149Updated 5 months ago
- Run Your Payload Without Running Your Payload☆176Updated 2 years ago
- (Demo) 3rd party agent for Havoc☆128Updated last year
- Infect Shared Files In Memory for Lateral Movement☆192Updated last year
- Shaco is a linux agent for havoc☆145Updated last year
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆134Updated 5 months ago
- ☆116Updated 2 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆167Updated 8 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆250Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆168Updated 10 months ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆215Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆276Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆88Updated last year
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆179Updated last year
- Nim Library for Offensive Security Development☆195Updated last year