khchen / memlib
Load Windows DLL from memory
☆126Updated last year
Related projects ⓘ
Alternatives and complementary repositories for memlib
- ☆44Updated 3 years ago
- A collection of offensive Nim example code☆74Updated 2 years ago
- A filtering SOCKS proxy server and client library written in nim.☆61Updated last year
- SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique☆88Updated 2 years ago
- a simple backdoor in Nim☆18Updated 3 years ago
- Interactive Windows Reverse Shell Server/Client☆43Updated 3 years ago
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆118Updated 2 years ago
- COFF and BOF Loader written in Nim☆168Updated 2 years ago
- Automated compiler obfuscation for nim☆135Updated 2 years ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆36Updated last month
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆179Updated last year
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Updated 3 years ago
- PE Crypter written in Nim☆94Updated 3 years ago
- Deal with Windows Registry from Nim☆29Updated 7 months ago
- Windows automation module☆55Updated last year
- Musings with Nim☆8Updated 3 years ago
- Nim version of MDSec's Parallel Syscall PoC☆123Updated 2 years ago
- Nim Socks5 library☆30Updated 2 years ago
- subhook wrapper for Nim https://github.com/Zeex/subhook☆17Updated 2 years ago
- Run python from a single exe☆34Updated 2 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆164Updated 3 years ago
- dll injection/hijack made fun☆23Updated last month
- Nim Library for Offensive Security Development☆195Updated last year
- Sleep obfuscation for shellcode implants and their reflective shit☆52Updated last year
- Collection of DLL function export forwards for DLL export function proxying☆89Updated last year
- ☆41Updated last year
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆90Updated 2 years ago
- D/Invoke implementation in Nim☆98Updated 2 years ago