Azr43lKn1ght / Rust-ProcHollowLinks
Process Hollowing in Rust with Process Executable Relocation Support for both 32 and 64 bit architecture environments.
☆22Updated 11 months ago
Alternatives and similar repositories for Rust-ProcHollow
Users that are interested in Rust-ProcHollow are comparing it to the libraries listed below
Sorting:
- ☆58Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Updated 2 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 4 years ago
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12Updated 2 years ago
- ☆24Updated 10 months ago
- ☆32Updated 10 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆26Updated last year
- Remap ntdll.dll using only NTAPI functions with a suspended process☆25Updated 7 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆23Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Updated last year
- ☆12Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆45Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆43Updated 2 years ago
- various methods of making API calls☆19Updated 10 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Unpacker for donut shellcode☆17Updated 5 years ago
- single-threaded event driven sleep obfuscation poc for linux☆35Updated 5 months ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆13Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆28Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 10 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 7 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated 2 years ago