Skip to content

Files

Latest commit

 

History

History
22 lines (10 loc) · 658 Bytes

README.md

File metadata and controls

22 lines (10 loc) · 658 Bytes

Nim Reverse Shell

A simple reverse shell written in Nim that bypasses Windows Defender detection (see the "Tested Operating Systems" section below for more details). This code is made for educational purposes only.

Tested Operating Systems

  • Windows 10 (10.0.19045)
  • Windows 11 (10.0.22621)

Compilation

The code can be compiled in various ways using Nim. In this example, the code is compiled to EXE using MinGW and runs in the victim's background once executed (thanks to the "--app:gui" flag). I strongly recommend to follow the below example for minimum detections as possible.

nim c -d:mingw --app:gui rev_shell.nim