Brother-x86 / malleable-rust-loader
Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various methods and perform multiple data operation to deobfuscate or decrypt payloads and new configuration.
β8Updated this week
Alternatives and similar repositories for malleable-rust-loader:
Users that are interested in malleable-rust-loader are comparing it to the libraries listed below
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ44Updated last year
- stack spoofingβ80Updated 4 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.β72Updated last month
- Various methods of executing shellcodeβ69Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.β73Updated 7 months ago
- Shellcode loaderβ78Updated 4 months ago
- early cascade injection PoC based on Outflanks blog post, in rustβ57Updated 4 months ago
- β53Updated 2 months ago
- Shellcode Loader Utilizing ETW Eventsβ60Updated last month
- shell code exampleβ33Updated 2 weeks ago
- Proxy function calls through the thread pool with easeβ23Updated last month
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.β61Updated last year
- API Hammering with C++20β45Updated 2 years ago
- converts sRDI compatible dlls to shellcodeβ23Updated 2 months ago
- Exploiting the KsecDD Windows driver through Server Silosβ50Updated 4 months ago
- Classic Process Injection with Memory Evasion Techniques implemantationβ68Updated last year
- Execute dotnet app from unmanaged processβ71Updated 3 months ago
- Template-based generation of shellcode loadersβ77Updated 11 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.β31Updated 3 weeks ago
- a demo module for the kaine agent to execute and inject assembly modulesβ38Updated 7 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged userβ39Updated 7 months ago
- β27Updated 3 months ago
- TypeLib persistence techniqueβ108Updated 5 months ago
- β97Updated 2 months ago
- ForsHopsβ22Updated last week
- Rust template/library for implementing your own COFF loaderβ49Updated 2 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process holβ¦β68Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features positβ¦β49Updated 2 weeks ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assemblyβ60Updated last year
- Patch AMSI and ETW in remote process via direct syscallβ81Updated 2 years ago