m4ul3r / writing_nimlessLinks
Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.
☆85Updated 3 months ago
Alternatives and similar repositories for writing_nimless
Users that are interested in writing_nimless are comparing it to the libraries listed below
Sorting:
- Indirect syscalls + DInvoke made simple.☆94Updated 9 months ago
- malware written for educational purposes☆67Updated 11 months ago
- Sleep obfuscation for shellcode implants and their reflective shit☆52Updated 2 years ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Updated last year
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆184Updated 2 years ago
- slides for talk given during uscg 2023 combine☆37Updated 2 years ago
- PoC XLL builder in Python/Nim☆47Updated 2 years ago
- Your syscall factory☆124Updated 2 weeks ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Updated 2 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆113Updated 3 months ago
- A tunneling toolkit enabling operators to move data from one place to another evasively.☆71Updated last month
- A hoontr must hoont☆98Updated 2 months ago
- A process injection technique using only thread context manipulation☆38Updated last year
- Threadless shellcode injection tool☆67Updated last year
- Internal Monologue BOF☆74Updated 9 months ago
- A Mythic Agent written in PIC C.☆200Updated 8 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆131Updated 3 months ago
- Automated .NET AppDomain hijack payload generation☆127Updated 8 months ago
- DLL sideloading/proxying with Nim!☆176Updated 2 years ago
- ☆135Updated last month
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆121Updated last year
- ☆42Updated 2 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆125Updated last month
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆192Updated 10 months ago
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆87Updated last week
- 64-bit, position-independent implant template for Windows in Rust.☆143Updated 5 months ago
- Sample Rust Hooking Engine☆36Updated last year
- Nim Library for Offensive Security Development☆198Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆101Updated 6 months ago
- Local & remote Windows DLL Proxying☆165Updated last year