emrekybs / nim-shell
Reverse shell that can bypass windows defender detection
☆164Updated last year
Alternatives and similar repositories for nim-shell:
Users that are interested in nim-shell are comparing it to the libraries listed below
- PowerShell Obfuscator☆163Updated 10 months ago
- An aggressor script that can help automate payload building in Cobalt Strike☆115Updated last year
- Heavily obfuscated ASP web shell generation tool.☆160Updated 11 months ago
- ☆163Updated last year
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆201Updated 3 months ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 3 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆254Updated 8 months ago
- Persistent Powershell backdoor tool {😈}☆116Updated 8 months ago
- ☆227Updated 5 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 11 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆179Updated 7 months ago
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆88Updated last week
- Awesome AV/EDR/XDR Bypass Tips☆267Updated last year
- Continuous password spraying tool☆179Updated last month
- ☆153Updated 9 months ago
- PDF dropper Red Team Scenairos☆202Updated 8 months ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆110Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆509Updated 2 weeks ago
- A cheatsheet for NetExec☆115Updated 2 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆112Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆297Updated 5 months ago
- Amsi Bypass payload that works on Windwos 11☆376Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆88Updated 6 months ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆86Updated last year
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆319Updated 11 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆138Updated 10 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆235Updated 3 weeks ago
- yet another AV killer tool using BYOVD☆270Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆402Updated 5 months ago