2024-04-20 –, Track 1
Nim is a statically typed compiled systems programming language. It is described as efficient, expressive, elegant by its creators. In offensive security, deploying Nim binaries are challenging due to the Nim runtime being heavily flagged by AV. Removing the Nim runtime is one way to avoid detection.
In this talk, we will go over the steps and coding style that is involved in removing the Nim runtime from a Nim compiled binary. This can be used to create binaries that are closer to C and leverage this capability to write position independent code in Nim.
Vulnerable Researcher out in Virginia, born and raised in Kansas