us-cyber-team / nim_for_hackers2Links
slides for talk given during uscg 2023 combine
☆37Updated last year
Alternatives and similar repositories for nim_for_hackers2
Users that are interested in nim_for_hackers2 are comparing it to the libraries listed below
Sorting:
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 4 months ago
- malware written for educational purposes☆66Updated 9 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆83Updated last month
- ☆47Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆94Updated 7 months ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Updated last year
- ☆36Updated last year
- in-process powershell runner for BRC4☆46Updated last year
- Situational Awareness script to identify how and where to run implants☆57Updated 8 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆38Updated last month
- Explore and filter your GitHub starred repositories☆27Updated last year
- Permanently disable EDRs as local admin☆94Updated last month
- Sniffing files generator☆59Updated 5 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆79Updated 5 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- ☆57Updated 9 months ago
- PoC XLL builder in Python/Nim☆47Updated 2 years ago
- BOF for C2 framework☆42Updated 9 months ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆42Updated last year
- ☆34Updated 4 months ago
- A process injection technique using only thread context manipulation☆37Updated last year
- Automated .NET AppDomain hijack payload generation☆127Updated 6 months ago
- Lateral Movement via the .NET Profiler☆82Updated 9 months ago
- Mythic C2 Agent written in x64 PIC C☆82Updated 6 months ago
- ☆110Updated 6 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆38Updated 4 months ago