frkngksl / ParallelNimcallsLinks
Nim version of MDSec's Parallel Syscall PoC
☆124Updated 3 years ago
Alternatives and similar repositories for ParallelNimcalls
Users that are interested in ParallelNimcalls are comparing it to the libraries listed below
Sorting:
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Updated 3 years ago
- A quick example of the Hells Gate technique in Nim☆96Updated 4 years ago
- D/Invoke implementation in Nim☆103Updated 3 years ago
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆123Updated 3 years ago
- COFF and BOF Loader written in Nim☆176Updated 3 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Updated 3 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Updated 2 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Updated 4 years ago
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆186Updated 2 years ago
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆86Updated 4 years ago
- Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.☆19Updated 3 years ago
- PoC XLL builder in Python/Nim☆49Updated 3 years ago
- PE Crypter written in Nim☆100Updated 4 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 3 years ago
- Smart Card PIN swiping DLL☆78Updated 5 years ago
- ☆137Updated 2 years ago
- ☆71Updated 3 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆88Updated 3 years ago
- Implant drop-in for EDR testing☆147Updated 2 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆109Updated 4 years ago
- ☆42Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆117Updated 2 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆110Updated 2 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆132Updated 2 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆101Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆121Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆105Updated 4 years ago
- Run python from a single exe☆35Updated 3 years ago
- ☆55Updated 4 years ago