0xflux / ETW-Bypass-RustLinks
Event Tracing for Windows EDR bypass in Rust (usermode)
☆37Updated last year
Alternatives and similar repositories for ETW-Bypass-Rust
Users that are interested in ETW-Bypass-Rust are comparing it to the libraries listed below
Sorting:
- early cascade injection PoC based on Outflanks blog post, in rust☆61Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 4 months ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Updated 3 months ago
- ☆32Updated last year
- BOF for C2 framework☆44Updated last year
- Unix Process hollowing in rust☆22Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Updated last month
- BOF to decrypt Signal Desktop chat logs☆72Updated 10 months ago
- ☆47Updated 2 years ago
- Sample Rust Hooking Engine☆36Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 8 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆60Updated 9 months ago
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆42Updated 8 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Updated 6 months ago
- ☆100Updated 2 years ago
- Rust template/library for implementing your own COFF loader☆72Updated 11 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- ☆54Updated 7 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 5 months ago
- Proxy function calls through the thread pool with ease☆31Updated 10 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆100Updated 5 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆62Updated 6 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- Find jmp gadgets for call stack spoofing.☆71Updated 2 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆62Updated last year
- ☆38Updated 9 months ago
- Heap encryption in Nim☆20Updated last year
- ☆26Updated 9 months ago