NimShellCodeLoader
Shellcode loader
A tool for loading and executing shellcode in Windows using Nim programming language
免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
619 stars
13 watching
114 forks
Language: C
last commit: 11 months ago evasion-attacknimoffensiveshellcode-loader
Related projects:
Repository | Description | Stars |
---|---|---|
axx8/shellcode_loader | A toolset for creating and deploying malicious shellcode in Windows systems | 412 |
hzllaga/shellcodeloader | A tool for encoding and compiling shellcode into an executable file with anti-sandbox features. | 523 |
joshfaust/alaris | A low-level shellcode loader designed to bypass modern EDR systems and protect malware execution flows. | 888 |
plackyhacker/shellcode-injection-techniques | A collection of C# techniques for injecting malicious shellcode into processes | 447 |
onehone/c--shellcode | A tool to load and execute malicious C code, likely used in exploit development and penetration testing. | 20 |
timwhitez/doge-loader | A tool for loading shellcode into Cobalt Strike | 279 |
arno0x/shellcodewrapper | A tool for encrypting and wrapping shellcode to evade antivirus detection | 434 |
pizz33/gobypassav-shellcode | A tool for creating shellcode bypasses of antivirus software | 816 |
ydhcui/csload.net | A tool designed to bypass common anti-malware measures by loading malicious Cobalt Strike shellcodes into infected systems. | 121 |
k8gege/scrun | A tool designed to bypass antivirus software and load malicious shellcode into processes | 177 |
dojo/loader | A JavaScript module loader that supports AMD and CJS formats for loading modules in web browsers, Node.js, and Nashorn environments. | 16 |
codingconcepts/env | A tool for loading environment variables into Go structs in a flexible and type-safe manner. | 114 |
zztkm/vdotenv | A module to read environment variables from configuration files | 35 |
nkrapivin/wavload | A library providing functions to load and manipulate WAV audio files in GameMaker Studio. | 6 |
nul0x4c/atomldr | A DLL loader with advanced evasion techniques to bypass user-land hooks and load malicious payloads. | 654 |