TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Nim on the Attack: Process Injection Using Nim and the Windows API

77 pointsby sunnyPalmost 4 years ago

3 comments

auxymalmost 4 years ago
Interesting to see Nim used here. I participate a bit in its community because it's a fun language, but I had not yet heard that it was used in opsec circles.
Const-mealmost 4 years ago
I wonder why people are writing shell codes for that?<p>When I need to inject my code into another process, I write a DLL and only inject LoadLibrary function call. Much more reliable this way: the OS applies relocation table, I have C and C++ runtimes in the injected code, the result is compatible with ASLR, if my DLL has other DLL dependencies the OS will load them first, etc.
评论 #27871448 未加载
评论 #27872595 未加载
评论 #27871386 未加载
评论 #27871934 未加载
kcartlidgealmost 4 years ago
I followed the link to the Nim site and downloaded the official 64 bit version.<p>Windows Defender (Win10) reports a <i>severe threat</i> in <i>nim-1.4.8\bin\vccexe.exe</i> - <i>Trojan:Win32&#x2F;Wacatac.B!ml</i> - which allows remote code execution.<p>It may be a false positive - but the whole post is about exploits so I&#x27;ll probably not risk it.
评论 #27873488 未加载
评论 #27875049 未加载