[S] worked on nim. added changes to NIM docs.
This commit is contained in:
@@ -11,13 +11,9 @@ format:
|
||||
[seq[byte]](@[0x40,0x80]
|
||||
|
||||
|
||||
# mic_reg.nim
|
||||
|
||||
[Broken]
|
||||
Checks if Windows OSD is enabled.
|
||||
|
||||
# encfile.nim
|
||||
Has multiple functions to encrypt text and/or files (streams) with AES-256 derived using HMAC (SHA512_256). Max. password size 1024.
|
||||
Has multiple functions to encrypt text and/or files (streams) with AES-256 derived using HMAC (SHA512_256). Max. password size 1024 characters. Tested. Is suitable for sensitive data.
|
||||
Has a fingerprint/is detectable.
|
||||
# OFFENSIVEencfile.nim
|
||||
Very stripped-down encryption tool. Takes a stream and encrypts it (AES256 with HMAC SHA512_256). No max. password size.
|
||||
@@ -28,4 +24,16 @@ Ideally a "packer"/loader for the main stage. Still very experimental and needs
|
||||
|
||||
|
||||
# bsod.nim
|
||||
Serves a BSOD to targets on Windows.
|
||||
Serves a BSOD to targets on Windows.
|
||||
|
||||
# mic_reg.nim
|
||||
|
||||
[Broken]
|
||||
Checks if Windows OSD is enabled.
|
||||
|
||||
# checkfile.nim
|
||||
Basic program that uses direct syscalls to know if a file exists. Undetectable in normal conditions.
|
||||
Can be chained with other direct syscalls to copy sensitive files.
|
||||
|
||||
# basicadware.nim
|
||||
Basic adware. At execution, shows a MessageBox with a title and content picked from a random (limited) pool.
|
||||
|
||||
Reference in New Issue
Block a user