Highlights
- Pro
Stars
1
result
for source starred repositories
written in Nim
Clear filter
A deep dive into DLL hijacking, proxying, and malware development techniques. Explore Windows binary exploitation, dynamic linking abuse, and stealthy persistence methods.