snovvcrash / NimHollow
☆228Updated this week
Related projects: ⓘ
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆161Updated 3 years ago
- A Nim implementation of reflective PE-Loading from memory☆262Updated 2 weeks ago
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆117Updated 2 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆263Updated last year
- A BOF to automate common persistence tasks for red teamers☆263Updated last year
- Remove API hooks from a Beacon process.☆263Updated 3 years ago
- You shall pass☆241Updated 2 years ago
- Koppeling x Metatwin x LazySign☆200Updated 3 years ago
- ☆221Updated this week
- A little tool to play with the Seclogon service☆301Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆208Updated 2 years ago
- Nim Library for Offensive Security Development☆186Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆309Updated last year
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)☆302Updated 2 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆265Updated last year
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆182Updated 3 years ago
- Reuse open handles to dynamically dump LSASS.☆231Updated 5 months ago
- ☆150Updated this week
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆225Updated last year
- Apply a filter to the events being reported by windows event logging☆259Updated 3 years ago
- ☆245Updated this week
- Beacon Object File Loader☆270Updated 9 months ago
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆430Updated last year
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆229Updated 3 years ago
- COFF and BOF Loader written in Nim☆164Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆291Updated 9 months ago
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆176Updated last year
- Get fresh Syscalls from a fresh ntdll.dll copy☆220Updated 2 years ago
- Evasive Process Hollowing Techniques☆132Updated 4 years ago