us-cyber-team / nim_for_hackers2Links
slides for talk given during uscg 2023 combine
☆37Updated last year
Alternatives and similar repositories for nim_for_hackers2
Users that are interested in nim_for_hackers2 are comparing it to the libraries listed below
Sorting:
- malware written for educational purposes☆66Updated 8 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 3 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆82Updated 2 weeks ago
- Indirect syscalls + DInvoke made simple.☆92Updated 7 months ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Updated last year
- A small How-To on creating your own weaponized WSL file☆66Updated this week
- ☆34Updated 3 months ago
- ☆47Updated 2 years ago
- in-process powershell runner for BRC4☆46Updated last year
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated 2 months ago
- Sniffing files generator☆59Updated 5 months ago
- PoC XLL builder in Python/Nim☆46Updated 2 years ago
- BOF for C2 framework☆41Updated 8 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 4 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Permanently disable EDRs as local admin☆84Updated 3 weeks ago
- Situational Awareness script to identify how and where to run implants☆54Updated 7 months ago
- Mythic C2 Agent written in x64 PIC C☆80Updated 5 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆34Updated 3 months ago
- ☆35Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 11 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆107Updated this week
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆36Updated 3 weeks ago
- Linux Sleep Obfuscation☆103Updated last year
- Installing wazuh SIEM Unified XDR and SIEM protection☆29Updated last month
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆88Updated 2 years ago
- ☆55Updated 9 months ago
- ☆29Updated last year
- Section-based payload obfuscation technique for x64☆64Updated 11 months ago