nbaertsch / nimvokeLinks
Indirect syscalls + DInvoke made simple.
☆96Updated last year
Alternatives and similar repositories for nimvoke
Users that are interested in nimvoke are comparing it to the libraries listed below
Sorting:
- malware written for educational purposes☆71Updated 3 weeks ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Updated 6 months ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Updated 2 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Updated 2 years ago
- PoC XLL builder in Python/Nim☆48Updated 3 years ago
- Internal Monologue BOF☆79Updated last year
- A hoontr must hoont☆101Updated 2 months ago
- Lateral Movement Bof with MSI ODBC Driver Install☆141Updated 3 months ago
- Sample Rust Hooking Engine☆36Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Updated 5 months ago
- A python script that automates a C2 Profile build☆48Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Updated 7 months ago
- RPC to WebClient startup☆54Updated 5 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆128Updated 3 months ago
- Windows Thread Pool Injection Havoc Implementation☆33Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Updated 6 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆135Updated 6 months ago
- A small How-To on creating your own weaponized WSL file☆119Updated 6 months ago
- Find DLLs with RWX section☆80Updated 2 years ago
- adws enumeration bof☆160Updated 3 months ago
- Blog/Journal on how to backdoor VSCode extensions☆76Updated 6 months ago
- ForsHops☆152Updated 10 months ago
- A Payload Analysis Framework☆114Updated 3 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Updated 3 years ago
- A Mythic Agent written in PIC C.☆206Updated 11 months ago
- Impersonate Tokens using only NTAPI functions☆83Updated 9 months ago
- A collection of position independent coding resources☆106Updated 2 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Updated 5 months ago
- Random BOFs for LDAP tradecraft☆72Updated 4 months ago