frkngksl / ParallelNimcalls
Nim version of MDSec's Parallel Syscall PoC
☆125Updated 3 years ago
Alternatives and similar repositories for ParallelNimcalls
Users that are interested in ParallelNimcalls are comparing it to the libraries listed below
Sorting:
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆94Updated 2 years ago
- COFF and BOF Loader written in Nim☆174Updated 2 years ago
- D/Invoke implementation in Nim☆101Updated 2 years ago
- A quick example of the Hells Gate technique in Nim☆95Updated 3 years ago
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆119Updated 3 years ago
- Experiment on reproducing Obfuscate & Sleep☆144Updated 4 years ago
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆182Updated 2 years ago
- Your syscall factory☆121Updated 2 months ago
- Implant drop-in for EDR testing☆138Updated last year
- ShellcodeFluctuation PoC ported to Nim☆77Updated 2 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆135Updated 2 years ago
- Overwrite a process's recovery callback and execute with WER☆103Updated 3 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆51Updated last year
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 2 years ago
- PE Crypter written in Nim☆98Updated 4 years ago
- ☆76Updated 2 years ago
- ☆165Updated 3 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆116Updated last year
- ☆145Updated 2 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆105Updated 2 years ago
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆125Updated 3 years ago
- ☆140Updated 2 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆156Updated 4 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆113Updated last year
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆94Updated 3 years ago
- ☆136Updated last year
- ☆115Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- Tool for playing with Windows Access Token manipulation.☆54Updated 2 years ago
- ☆111Updated 2 years ago