slides for talk given during uscg 2023 combine
☆38Sep 6, 2023Updated 2 years ago
Alternatives and similar repositories for nim_for_hackers2
Users that are interested in nim_for_hackers2 are comparing it to the libraries listed below
Sorting:
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Jul 11, 2025Updated 7 months ago
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆30Oct 2, 2025Updated 5 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 7 months ago
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- ☆46Jun 21, 2023Updated 2 years ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP☆126Updated this week
- ☆108Oct 29, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆77Feb 24, 2026Updated last week
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated 11 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆124Jul 11, 2025Updated 7 months ago
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- ☆65Mar 15, 2024Updated last year
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆44Jun 12, 2024Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- BOF with Synthetic Stackframe☆230Oct 30, 2025Updated 4 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆87Feb 16, 2026Updated 3 weeks ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated 2 months ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆203Mar 26, 2025Updated 11 months ago
- Indirect syscalls + DInvoke made simple.☆95Dec 24, 2024Updated last year
- ☆48Dec 5, 2025Updated 3 months ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆40Oct 8, 2024Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆145Apr 18, 2025Updated 10 months ago