You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -53,6 +53,7 @@ My experiments in weaponizing [Nim](https://nim-lang.org/) for implant developme
53
53
|[blockdlls_acg_ppid_spoof_bin.nim](../master/src/blockdlls_acg_ppid_spoof_bin.nim)| Creates a suspended process that spoofs its PPID to explorer.exe, also enables BlockDLLs and ACG |
54
54
|[named_pipe_client_bin.nim](../master/src/named_pipe_client_bin.nim)| Named Pipe Client |
55
55
|[named_pipe_server_bin.nim](../master/src/named_pipe_server_bin.nim)| Named Pipe Server |
56
+
|[embed_rsrc_bin.nim](../master/src/embed_rsrc_bin.nim)| Embeds a resource (zip file) at compile time and extracts contents at runtime |
56
57
|[self_delete_bin.nim](../master/src/self_delete_bin.nim)| A way to delete a locked or current running executable on disk. Method discovered by [@jonasLyk](https://twitter.com/jonasLyk/status/1350401461985955840)|
57
58
|[encrypt_decrypt_bin.nim](../master/src/encrypt_decrypt_bin.nim)| Encryption/Decryption using AES256 (CTR Mode) using the [Nimcrypto](https://github.com/cheatfate/nimcrypto) library |
58
59
|[amsi_patch_bin.nim](../master/src/amsi_patch_bin.nim)| Patches AMSI out of the current process |
0 commit comments