m4ul3r / writing_nimlessLinks
Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.
☆85Updated 6 months ago
Alternatives and similar repositories for writing_nimless
Users that are interested in writing_nimless are comparing it to the libraries listed below
Sorting:
- Indirect syscalls + DInvoke made simple.☆96Updated last year
- malware written for educational purposes☆70Updated 3 weeks ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Updated 2 years ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Updated last year
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆187Updated 2 years ago
- PoC XLL builder in Python/Nim☆48Updated 3 years ago
- A hoontr must hoont☆101Updated last month
- Your syscall factory☆126Updated last week
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆119Updated 6 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123Updated last year
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆135Updated 6 months ago
- Nim Library for Offensive Security Development☆198Updated 2 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆137Updated 4 months ago
- Sample Rust Hooking Engine☆36Updated last year
- A Mythic Agent written in PIC C.☆205Updated 11 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆161Updated 6 months ago
- Internal Monologue BOF☆79Updated last year
- ☆126Updated last year
- ☆137Updated 11 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆162Updated last month
- ☆142Updated 2 months ago
- DLL sideloading/proxying with Nim!☆175Updated 3 years ago
- Threadless shellcode injection tool☆67Updated last year
- Automated .NET AppDomain hijack payload generation☆128Updated 11 months ago
- ☆137Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆128Updated 2 months ago
- A small How-To on creating your own weaponized WSL file☆119Updated 5 months ago
- Linker for Beacon Object Files☆146Updated this week