NimPlant is a lightweight, first-stage Command and Control (C2) implant written in Nim, designed to provide a flexible and efficient solution for remote access and control. It offers a range of features, including a small footprint, easy deployment, and customizable communication protocols, making it an attractive option for penetration testers and red teamers. With its modular architecture and extensible design, NimPlant can be easily integrated with other tools and frameworks, allowing users to tailor their C2 infrastructure to specific needs and environments.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A DNS rebinding attack framework for security researchers and penetration testers.
Emulate offensive attack techniques in the cloud with a self-contained Go binary.
Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.
A powerful tool for hiding the true location of your Teamserver, evading detection from Incident Response, redirecting users, blocking specific IP addresses, and managing Malleable C2 traffic in Red Team engagements.
A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.
A C#-based Command and Control Framework for remote access and control of compromised systems.