us-cyber-team / nim_for_hackers2Links
slides for talk given during uscg 2023 combine
☆37Updated 2 years ago
Alternatives and similar repositories for nim_for_hackers2
Users that are interested in nim_for_hackers2 are comparing it to the libraries listed below
Sorting:
- malware written for educational purposes☆67Updated 10 months ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- in-process powershell runner for BRC4☆47Updated last year
- Indirect syscalls + DInvoke made simple.☆94Updated 8 months ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆84Updated 2 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆47Updated 2 months ago
- ☆57Updated 10 months ago
- ☆47Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆65Updated 9 months ago
- Mythic C2 Agent written in x64 PIC C☆82Updated 7 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Permanently disable EDRs as local admin☆98Updated 2 months ago
- ☆36Updated last year
- ☆59Updated last year
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- Explore and filter your GitHub starred repositories☆27Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- BOF for C2 framework☆43Updated 10 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated last year
- ☆110Updated 6 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆79Updated 6 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- ☆42Updated 2 years ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated 4 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆45Updated 5 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- PoC XLL builder in Python/Nim☆47Updated 2 years ago