When you're focused on offensive security like I am, you're constantly looking for new methods, tactics, and tools to help you get any advantage. While on that quest the other day, I stumbled across a little-known programming language called Nim.
Long story short...after about 3 hours of reading Nim documentation and watching a few videos I was able to build a custom tool that allowed me to gain shell access from a Windows 10 laptop without tripping Defender.
Useful Links
========================================
Nim Download and Documentation
nim-lang.org
Offensive Nim Github Repo
github.com/byt3bl33d3r/Offens...
HuskyHacks and The Taggart Institute discuss Nim for Pentesting
• #ChillCode | Nim for P...
My Nim-Shell Github Repo
github.com/daniellowrie/Nim-S...
========================================
#nim #nimlang #nimprogramming #redteam #pentesting #penetrationtesting #oscp #python #pythonprogramming #programmingforbeginners #infosec #cybersecurity #offensivesecurity #ethicalhacking #ethicalhacker #malware #informationsecurity #reverseshell #netcat #fudmalware #hacker #hackers #hacking #programmer #kali #kalilinux
========================================
Chapters
00:00 intro
00:55 What is Nim?
04:20 How I Found Nim
05:40 Offensive Nim Repo
09:00 Nim ReversShell Code Explanation
10:45 Sleep without sleep()
15:05 Network Socket Code
19:45 HuskyHacks - Nim for Pentesting
20:22 Compile Code
21:45 Start Netcat Listener
22:34 Run Nim-Shell
25:11 Final Thoughts
12 июл 2024