0xflux / Sanctum
Sanctum is a proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antivirus. Built in Rust.
☆56Updated this week
Alternatives and similar repositories for Sanctum:
Users that are interested in Sanctum are comparing it to the libraries listed below
- DLL proxying for lazy people☆155Updated 3 months ago
- Rust For Windows Cheatsheet☆116Updated 5 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆138Updated 5 months ago
- Host CLR and run .NET binaries using Rust☆92Updated this week
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆38Updated 9 months ago
- Dynamically invoke arbitrary code with Rust tricks, #[no_std] support, and compatibility for x64, x86, ARM64 and WoW64 (DInvoke)☆57Updated this week
- Some Rust program I wrote while learning Malware Development☆128Updated last month
- A Rust crate to parse user-mode minidump files generated on Windows☆12Updated 3 weeks ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆334Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆209Updated 2 years ago
- kernel callback removal (Bypassing EDR Detections)☆142Updated last week
- An i686 & x86_64 position independent implant template for Rust 🦀☆23Updated 2 weeks ago
- Inject a shellcode in a remote process using Process Hollowing.☆49Updated 3 years ago
- ☆46Updated last year
- Early Bird APC Injection in Rust☆57Updated 5 months ago
- Detect EDR's exceptions by inspecting processes' loaded modules☆130Updated last year
- A thin Rust wrapper around Windows' hardware breakpoints.☆21Updated 2 years ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆31Updated 3 weeks ago
- Command & Control server and agent written in Rust☆36Updated 2 years ago
- 64-bit, position-independent implant template for Windows in Rust.☆116Updated 5 months ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆64Updated 3 weeks ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 8 months ago
- A COFF Loader written in Rust☆63Updated this week
- Dynamic rust bindings to the Windows API☆16Updated 3 years ago
- "Service-less" driver loading☆150Updated 4 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆72Updated last month
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆62Updated 3 months ago
- Reflective DLL self-loading as a library☆19Updated last year
- Template-based generation of shellcode loaders☆77Updated 11 months ago
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆132Updated 3 weeks ago