CX330Blake / Black-Hat-ZigLinks
This project provides some code examples of Zig for malwares, hacking, and red teaming. ⚡
☆181Updated last month
Alternatives and similar repositories for Black-Hat-Zig
Users that are interested in Black-Hat-Zig are comparing it to the libraries listed below
Sorting:
- Some attempts at using Zig(https://ziglang.org/) in penetration testing.☆250Updated last week
- ZYRA: Your Runtime Armor. ZYRA is an Zig-written obfuscator/packer for executable binaries.☆65Updated 3 months ago
- A simple header only SHA1 implementation in C (no dependencies)☆38Updated 9 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆489Updated 3 weeks ago
- obfusgator.zig☆30Updated 10 months ago
- A simple Meterpreter stager written in Rust.☆42Updated 2 weeks ago
- Generates Complete Zig bindings for Win32. See https://github.com/marlersoft/zigwin32 for the bindings themselves.☆161Updated last month
- slides for talk given during uscg 2023 combine☆37Updated 2 years ago
- Python tool to resolve all strings in Go binaries obfuscated by garble☆133Updated 8 months ago
- Call Stack Spoofing for Rust☆193Updated last week
- Comprehensive Windows Syscall Extraction & Analysis Framework☆151Updated 2 months ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆14Updated 9 months ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆72Updated last year
- bof-launcher - library for loading, executing and in-memory masking BOFs on Windows (x64, x86) and Linux (x64, x86, aarch64, arm). Ready …☆261Updated 3 weeks ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 7 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆86Updated 8 months ago
- Very basic dll injector written in zig, for windows. Assumes the injector, target process, and dll are of the same bitness. Usage: ./inje…☆29Updated 5 years ago
- Unmask real IP address of a domain hidden behind Cloudflare by IPs bruteforcing☆21Updated 11 months ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- Monarch - The Adversary Emulation Toolkit☆64Updated 10 months ago
- macos stealer poc☆129Updated 4 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆42Updated last year
- Speedy probe-based UDP service scanner☆104Updated 3 weeks ago
- Make your programs stealthier🐝☆194Updated 5 months ago
- Dynamically invoke arbitrary code in Rust (Dinvoke)☆94Updated last week
- Generate Proxy DLLs in Rust☆45Updated 2 months ago
- malware written for educational purposes☆68Updated last year
- UAC Bypass using CMSTP in Rust☆33Updated 11 months ago
- Find jmp gadgets for call stack spoofing.☆67Updated last month
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆254Updated last month