frkngksl / ParallelNimcalls
Nim version of MDSec's Parallel Syscall PoC
☆125Updated 3 years ago
Alternatives and similar repositories for ParallelNimcalls:
Users that are interested in ParallelNimcalls are comparing it to the libraries listed below
- A quick example of the Hells Gate technique in Nim☆95Updated 3 years ago
- COFF and BOF Loader written in Nim☆173Updated 2 years ago
- D/Invoke implementation in Nim☆101Updated 2 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆94Updated 2 years ago
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆119Updated 3 years ago
- Implant drop-in for EDR testing☆137Updated last year
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆181Updated 2 years ago
- ShellcodeFluctuation PoC ported to Nim☆76Updated 2 years ago
- Overwrite a process's recovery callback and execute with WER☆103Updated 3 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 2 years ago
- ☆111Updated 2 years ago
- Experiment on reproducing Obfuscate & Sleep☆144Updated 4 years ago
- PE Crypter written in Nim☆98Updated 4 years ago
- ☆135Updated last year
- It's pointy and it hurts!☆125Updated 2 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆127Updated 2 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆94Updated 3 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆134Updated 2 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆125Updated 2 years ago
- ☆114Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆113Updated last year
- ☆62Updated 2 years ago
- Your syscall factory☆121Updated last month
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆101Updated 2 years ago
- ☆145Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆104Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆91Updated 2 years ago
- ☆139Updated 2 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆51Updated last year