0xflux / ETW-Bypass-RustLinks
Event Tracing for Windows EDR bypass in Rust (usermode)
☆36Updated last year
Alternatives and similar repositories for ETW-Bypass-Rust
Users that are interested in ETW-Bypass-Rust are comparing it to the libraries listed below
Sorting:
- early cascade injection PoC based on Outflanks blog post, in rust☆61Updated last year
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 10 months ago
- BOF for C2 framework☆44Updated last year
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆41Updated 8 months ago
- BOF to decrypt Signal Desktop chat logs☆72Updated 9 months ago
- Proxy function calls through the thread pool with ease☆31Updated 9 months ago
- Unix Process hollowing in rust☆22Updated 11 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆71Updated 3 weeks ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 11 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 3 months ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Updated 3 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆56Updated 7 months ago
- Find jmp gadgets for call stack spoofing.☆68Updated 2 months ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆60Updated 8 months ago
- ☆47Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆62Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆58Updated 5 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75Updated last year
- ☆100Updated 2 years ago
- ☆38Updated 8 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- Bunch of BOF files☆37Updated 5 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 4 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Updated 6 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆50Updated 6 months ago
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Updated last year
- Sample Rust Hooking Engine☆36Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year