0xflux / Sanctum
Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antivirus. Built in Rust.
☆182Updated this week
Alternatives and similar repositories for Sanctum
Users that are interested in Sanctum are comparing it to the libraries listed below
Sorting:
- Call Stack Spoofing for Rust☆157Updated this week
- Rust For Windows Cheatsheet☆120Updated 6 months ago
- ROP-based sleep obfuscation to evade memory scanners☆351Updated 3 months ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆338Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆218Updated 2 years ago
- Some Rust program I wrote while learning Malware Development☆132Updated 3 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆144Updated 6 months ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆49Updated 11 months ago
- ☆189Updated 11 months ago
- Dynamically invoke arbitrary code with Rust tricks, #[no_std] support, and compatibility for x64, x86, ARM64 and WoW64 (DInvoke)☆77Updated last week
- Dynamically invoke arbitrary unmanaged code☆342Updated 5 months ago
- kernel callback removal (Bypassing EDR Detections)☆162Updated last month
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆143Updated 9 months ago
- Collect Windows telemetry for Maldev☆345Updated 3 months ago
- DLL proxying for lazy people☆157Updated 5 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆227Updated 4 months ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆261Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆210Updated 3 months ago
- Payload encoding utility to effectively lower payload entropy.☆116Updated last month
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆211Updated last month
- Windows rootkit designed to work with BYOVD exploits☆198Updated 4 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆335Updated 9 months ago
- Call stack spoofing for Rust☆333Updated 3 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆255Updated 9 months ago
- Using fibers to run in-memory code.☆206Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆258Updated 11 months ago
- A reflective DLL development template for the Rust programming language☆86Updated this week
- Some POCs for my BYOVD research and find some vulnerable drivers☆207Updated last month
- Detect EDR's exceptions by inspecting processes' loaded modules☆129Updated last year
- Injecting DLL into LSASS at boot☆105Updated 2 weeks ago