kensh1ro / NimTeleBackdoorLinks
a simple backdoor in Nim
☆20Updated 4 years ago
Alternatives and similar repositories for NimTeleBackdoor
Users that are interested in NimTeleBackdoor are comparing it to the libraries listed below
Sorting:
- Run python from a single exe☆35Updated 3 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Updated 4 years ago
- A collection of offensive Nim example code☆75Updated 3 years ago
- SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique☆93Updated 3 years ago
- A library for interacting with Windows through SMB written in Nim.☆16Updated last month
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Updated 3 years ago
- A simple Nim stager (w/ fiber execution)☆18Updated 3 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Updated 3 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Updated 3 years ago
- ☆39Updated 2 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆61Updated 4 years ago
- Interactive Windows Reverse Shell Server/Client☆42Updated 4 years ago
- Cobalt Strike BOF Files with Nim!☆86Updated 3 years ago
- COFF and BOF Loader written in Nim☆175Updated 3 years ago
- A nim port of C5pider's Ekko project.☆17Updated 3 years ago
- A cross-platform Nim implant for Prelude Operator☆32Updated 3 years ago
- ☆42Updated 2 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 4 years ago
- PE Crypter written in Nim☆99Updated 4 years ago
- ☆13Updated 3 years ago
- A quick example of the Hells Gate technique in Nim☆97Updated 4 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆91Updated 4 years ago
- Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.☆19Updated 3 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 4 years ago
- Unused DLL hollowing PoC in Nim☆17Updated 3 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 4 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆90Updated 2 years ago
- Another AMSI bypass - but in C++.☆23Updated 2 years ago