zimawhit3 / Bitmancer
Nim Library for Offensive Security Development
☆197Updated last year
Alternatives and similar repositories for Bitmancer:
Users that are interested in Bitmancer are comparing it to the libraries listed below
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆119Updated 3 years ago
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆180Updated 2 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆167Updated 3 years ago
- Your syscall factory☆121Updated 3 weeks ago
- COFF and BOF Loader written in Nim☆172Updated 2 years ago
- Beacon Object File Loader☆285Updated last year
- Patch AMSI and ETW☆238Updated 10 months ago
- DLL sideloading/proxying with Nim!☆167Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆144Updated 2 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆227Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆217Updated 2 years ago
- ☆299Updated last year
- Hookers are cooler than patches.☆170Updated 3 years ago
- Automated compiler obfuscation for nim☆138Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆188Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆112Updated last year
- Patching AmsiOpenSession by forcing an error branching☆144Updated last year
- Payload Generation Framework☆90Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆293Updated last year
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆133Updated last year
- Start new PowerShell without etw and amsi in pure nim☆157Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆210Updated 2 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆165Updated last year
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆182Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆287Updated last year
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆187Updated 2 years ago
- (Demo) 3rd party agent for Havoc☆136Updated last year
- miscellaneous scripts and programs☆236Updated 2 months ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆302Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆91Updated 2 years ago