us-cyber-team / nim_for_hackers2Links
slides for talk given during uscg 2023 combine
☆37Updated last year
Alternatives and similar repositories for nim_for_hackers2
Users that are interested in nim_for_hackers2 are comparing it to the libraries listed below
Sorting:
- malware written for educational purposes☆66Updated 6 months ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆81Updated last year
- ☆55Updated 7 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Situational Awareness script to identify how and where to run implants☆50Updated 6 months ago
- Mythic C2 Agent written in x64 PIC C☆79Updated 4 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last year
- ☆34Updated 2 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 2 months ago
- Section-based payload obfuscation technique for x64☆59Updated 9 months ago
- ☆48Updated last year
- Threadless shellcode injection tool☆64Updated 10 months ago
- Indirect syscalls + DInvoke made simple.☆91Updated 5 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Create Anti-Copy DRM Malware☆57Updated 9 months ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆27Updated this week
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆76Updated 3 months ago
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated 11 months ago
- Enable or Disable TokenPrivilege(s)☆13Updated last year
- Collection of red team techniques.☆50Updated last month
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆78Updated 3 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 10 months ago
- ☆56Updated 6 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆49Updated last month
- Explore and filter your GitHub starred repositories☆27Updated last year
- Tool to aid in dumping LSASS process remotely☆39Updated 10 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- A process injection technique using only thread context manipulation☆38Updated last year