Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.
☆20Feb 2, 2022Updated 4 years ago
Alternatives and similar repositories for Nim-HalosGate-Injector
Users that are interested in Nim-HalosGate-Injector are comparing it to the libraries listed below
Sorting:
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- A quick example of the Hells Gate technique in Nim☆93Aug 11, 2021Updated 4 years ago
- ☆14Mar 30, 2022Updated 3 years ago
- a simple backdoor in Nim☆19Aug 6, 2021Updated 4 years ago
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 10 months ago
- ☆60Dec 15, 2023Updated 2 years ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- Dynamic rust bindings to the Windows API☆17Jul 1, 2021Updated 4 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Nim Library for Offensive Security Development☆199Sep 4, 2023Updated 2 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- ☆46Jun 21, 2023Updated 2 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆28Feb 9, 2024Updated 2 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆125Dec 22, 2021Updated 4 years ago
- ☆11Apr 22, 2022Updated 3 years ago
- Event Tracing for Windows EDR bypass in Rust (usermode)☆39Jun 9, 2024Updated last year
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- A library for interacting with Windows through SMB written in Nim.☆17Sep 14, 2025Updated 6 months ago
- ☆15Apr 29, 2023Updated 2 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- ☆63Apr 4, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆64Sep 12, 2022Updated 3 years ago
- Beautify Nessus scan output☆12Dec 2, 2023Updated 2 years ago
- Asynchronous named pipe module for PowerShell☆21May 30, 2016Updated 9 years ago
- A cmake template for crystal palace☆39Dec 20, 2025Updated 3 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Jul 9, 2023Updated 2 years ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆51Nov 2, 2025Updated 4 months ago
- string encryption in Nim☆19Jun 15, 2024Updated last year