nbaertsch / nimvokeLinks
Indirect syscalls + DInvoke made simple.
☆96Updated last year
Alternatives and similar repositories for nimvoke
Users that are interested in nimvoke are comparing it to the libraries listed below
Sorting:
- malware written for educational purposes☆70Updated last week
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Updated 5 months ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Updated last year
- Sleep obfuscation for shellcode implants and their reflective shit☆53Updated 2 years ago
- PoC XLL builder in Python/Nim☆49Updated 3 years ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆35Updated last year
- Sample Rust Hooking Engine☆36Updated last year
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆97Updated last month
- Impersonate Tokens using only NTAPI functions☆83Updated 9 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆137Updated 4 months ago
- adws enumeration bof☆160Updated 3 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆128Updated 2 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆161Updated 5 months ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Updated last year
- Find DLLs with RWX section☆80Updated 2 years ago
- ForsHops☆151Updated 9 months ago
- Internal Monologue BOF☆79Updated last year
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 7 months ago
- Shellcode injection using the Windows Debugging API☆124Updated this week
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆130Updated 4 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆134Updated 6 months ago
- A Mythic Agent written in PIC C.☆207Updated 11 months ago
- Local SYSTEM auth trigger for relaying - X☆155Updated 5 months ago
- A python script that automates a C2 Profile build☆48Updated 3 weeks ago
- ☆137Updated 10 months ago
- A hoontr must hoont☆102Updated last month
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- Your syscall factory☆126Updated this week
- A small How-To on creating your own weaponized WSL file☆119Updated 5 months ago