Reverse shell that can bypass windows defender detection
☆173Mar 31, 2026Updated last month
Alternatives and similar repositories for nim-shell
Users that are interested in nim-shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- NetProbe: Network Probe☆176Oct 13, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- PacketSpy☆159May 31, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- ☆168Feb 29, 2024Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆121Jul 31, 2024Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆537Nov 14, 2025Updated 5 months ago
- ☆125Aug 24, 2025Updated 8 months ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆134Jun 1, 2024Updated last year
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆465Apr 13, 2026Updated 3 weeks ago
- ☆65Apr 28, 2024Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Jun 27, 2023Updated 2 years ago
- Tool designed for fetching, validating, and storing working proxies.☆260Nov 20, 2025Updated 5 months ago
- ☆570Mar 28, 2024Updated 2 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆79Apr 23, 2026Updated last week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆159Jul 14, 2025Updated 9 months ago
- IoT Camera Reconnaissance and Live Viewer☆184Jul 30, 2024Updated last year
- An interactive shell to spoof some LOLBins command line☆187Jan 27, 2024Updated 2 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆94Jun 18, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆184May 19, 2025Updated 11 months ago
- ☆89Jan 2, 2024Updated 2 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆45Oct 26, 2025Updated 6 months ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- ☆307Mar 15, 2025Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆444Oct 1, 2025Updated 7 months ago
- ☆74Apr 8, 2024Updated 2 years ago