oXis / NimWinAPICustomLinks
Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim
☆32Updated 4 years ago
Alternatives and similar repositories for NimWinAPICustom
Users that are interested in NimWinAPICustom are comparing it to the libraries listed below
Sorting:
- Run python from a single exe☆35Updated 3 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Updated 3 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Updated 4 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Updated 4 years ago
- all credits go to @mgeeky☆64Updated 4 years ago
- A nim port of C5pider's Ekko project.☆17Updated 3 years ago
- LoadLibrary for offensive operations☆33Updated 4 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Updated 3 years ago
- ☆39Updated 2 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 4 years ago
- A collection of offensive Nim example code☆74Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 5 years ago
- ☆42Updated 3 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Updated last year
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆41Updated 5 years ago
- ☆30Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆93Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆90Updated 4 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆62Updated 4 years ago
- Small POC for process ghosting☆40Updated 4 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Updated 4 years ago
- ☆44Updated 2 years ago
- ☆13Updated 3 years ago
- ☆18Updated 4 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆66Updated 2 years ago
- Unused DLL hollowing PoC in Nim☆17Updated 4 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Updated 3 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 4 years ago
- a simple backdoor in Nim☆19Updated 4 years ago
- Ntdll Unhooking POC☆19Updated 3 years ago