zimawhit3 / Bitmancer
Nim Library for Offensive Security Development
☆199Updated last year
Alternatives and similar repositories for Bitmancer
Users that are interested in Bitmancer are comparing it to the libraries listed below
Sorting:
- COFF and BOF Loader written in Nim☆174Updated 2 years ago
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆182Updated 2 years ago
- A tool for converting SysWhispers2 syscalls for use with Nim projects☆119Updated 3 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆167Updated 3 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆230Updated 3 years ago
- DLL sideloading/proxying with Nim!☆169Updated 2 years ago
- Patch AMSI and ETW☆239Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 2 years ago
- Your syscall factory☆121Updated 2 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆192Updated 3 years ago
- PE Crypter written in Nim☆98Updated 4 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆167Updated last year
- Automated compiler obfuscation for nim☆140Updated 2 years ago
- D/Invoke implementation in Nim☆101Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆216Updated 3 years ago
- Beacon Object File Loader☆286Updated last year
- A Nim implementation of reflective PE-Loading from memory☆281Updated 8 months ago
- Hookers are cooler than patches.☆169Updated 3 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆94Updated 2 years ago
- A BOF to automate common persistence tasks for red teamers☆276Updated 2 years ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆81Updated 11 months ago
- miscellaneous scripts and programs☆242Updated 3 months ago
- COFF file (BOF) for managing Kerberos tickets.☆295Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆218Updated 2 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆133Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆150Updated 3 years ago
- Dump the memory of any PPL with a Userland exploit chain☆333Updated 2 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆232Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆320Updated 2 years ago