Nim-Reverse-Shell icon indicating copy to clipboard operation
Nim-Reverse-Shell copied to clipboard

A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educ...

Nim Reverse Shell

A simple reverse shell written in Nim that bypasses Windows Defender detection (see the "Tested Operating Systems" section below for more details). This code is made for educational purposes only.

Tested Operating Systems

  • Windows 10 (10.0.19045)
  • Windows 11 (10.0.22621)

Compilation

The code can be compiled in various ways using Nim. In this example, the code is compiled to EXE using MinGW and runs in the victim's background once executed (thanks to the "--app:gui" flag). I strongly recommend to follow the below example for minimum detections as possible.

nim c -d:mingw --app:gui rev_shell.nim