oXis / NimWinAPICustom
Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim
☆32Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for NimWinAPICustom
- Run python from a single exe☆34Updated 2 years ago
- ☆41Updated last year
- ShellcodeFluctuation PoC ported to Nim☆75Updated 2 years ago
- a simple backdoor in Nim☆17Updated 3 years ago
- A simple Nim stager (w/ fiber execution)☆16Updated 2 years ago
- A nim port of C5pider's Ekko project.☆17Updated 2 years ago
- Unused DLL hollowing PoC in Nim☆16Updated 2 years ago
- HookDetection☆44Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆53Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆75Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆48Updated 2 years ago
- all credits go to @mgeeky☆58Updated 3 years ago
- A collection of offensive Nim example code☆73Updated 2 years ago
- A simple BOF implementation of klist using Windows API☆30Updated 2 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆27Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆56Updated 3 years ago
- Nim version of MDSec's Parallel Syscall PoC☆123Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆26Updated 3 years ago
- ☆34Updated 4 years ago
- ☆26Updated 4 years ago
- ☆49Updated 4 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆52Updated last year
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆91Updated 2 years ago
- ☆38Updated last year
- One gate to all syscalls!☆23Updated 2 years ago
- A quick example of the Hells Gate technique in Nim☆92Updated 3 years ago