itaymigdal / GhostNapLinks
Sleep obfuscation for shellcode implants and their reflective shit
☆51Updated last year
Alternatives and similar repositories for GhostNap
Users that are interested in GhostNap are comparing it to the libraries listed below
Sorting:
- PoC XLL builder in Python/Nim☆46Updated 2 years ago
- malware written for educational purposes☆66Updated 8 months ago
- ☆47Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆93Updated 7 months ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- Nim version of MDSec's Parallel Syscall PoC☆124Updated 3 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated last year
- ShellcodeFluctuation PoC ported to Nim☆78Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆86Updated 2 years ago
- Sample Rust Hooking Engine☆36Updated last year
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆82Updated 3 weeks ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆95Updated 3 years ago
- A nim port of C5pider's Ekko project.☆18Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆26Updated 4 months ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆68Updated 3 months ago
- Python module for running BOFs☆72Updated 2 years ago
- A quick example of the Hells Gate technique in Nim☆96Updated 3 years ago
- ☆42Updated 2 years ago
- ☆40Updated 2 years ago
- Click Once + App Domain☆62Updated last year
- ☆13Updated 3 years ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- maldev obviously☆27Updated 3 months ago
- ☆34Updated 4 months ago
- Tool for playing with Windows Access Token manipulation.☆55Updated 2 years ago
- Rewrite to fit my needs☆30Updated last year
- A care package of useful bofs for red team engagments☆55Updated 8 months ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- Sniffing files generator☆59Updated 5 months ago