BlackSnufkin / Rusty-Playground
Some Rust program I wrote while learning Malware Development
☆132Updated 3 months ago
Alternatives and similar repositories for Rusty-Playground
Users that are interested in Rusty-Playground are comparing it to the libraries listed below
Sorting:
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆210Updated 3 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆144Updated 6 months ago
- Shellcode loader designed for evasion. Coded in Rust.☆128Updated 2 years ago
- Port of Cobalt Strike's Process Inject Kit☆175Updated 5 months ago
- Rust For Windows Cheatsheet☆120Updated 6 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆187Updated 5 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆179Updated 3 months ago
- DLL proxying for lazy people☆157Updated 5 months ago
- Windows Persistence IT-Security☆100Updated 2 months ago
- Local & remote Windows DLL Proxying☆164Updated 11 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆227Updated 4 months ago
- ☆155Updated 9 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆242Updated 10 months ago
- Stage 0☆159Updated 5 months ago
- Early Bird APC Injection in Rust☆57Updated 7 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆226Updated 2 years ago
- Shellcode loader that executes embedded Lua from Rust.☆113Updated 5 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆64Updated 3 weeks ago
- ApexLdr is a DLL Payload Loader written in C☆109Updated 10 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆126Updated 3 weeks ago
- A Mythic agent for Windows written in C☆122Updated 3 weeks ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆161Updated 2 months ago
- Bypass LSA protection using the BYODLL technique☆159Updated 7 months ago
- Lateral Movement Using DCOM and DLL Hijacking☆291Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆49Updated 7 months ago
- ☆123Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆330Updated 2 years ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆187Updated last year
- An example reference design for a proposed BOF PE☆163Updated last month
- BOF with Synthetic Stackframe☆145Updated 2 months ago