EddieIvan01 / memexec
A library for loading and executing PE (Portable Executable) from memory without ever touching the disk
☆148Updated 4 years ago
Alternatives and similar repositories for memexec:
Users that are interested in memexec are comparing it to the libraries listed below
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆337Updated last year
- Dynamically invoke arbitrary unmanaged code☆341Updated 5 months ago
- Load DLLs from memory with rust☆137Updated 3 years ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆259Updated last year
- Shellcode loader designed for evasion. Coded in Rust.☆129Updated 2 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆212Updated 2 years ago
- Windows shellcode development in Rust☆291Updated 4 years ago
- Black cat magic ฅ(^・ω・^ฅ ✿)☆53Updated 2 years ago
- A rust library that allows you to delete your executable while it's running.☆90Updated 2 years ago
- Threadless Process Injection through entry point hijacking☆344Updated 7 months ago
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆263Updated last year
- Rust For Windows Cheatsheet☆119Updated 6 months ago
- UDP implant☆66Updated 3 years ago
- Using fibers to run in-memory code.☆206Updated last year
- Call stack spoofing for Rust☆333Updated 3 months ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆94Updated 3 years ago
- Reuse open handles to dynamically dump LSASS.☆243Updated last year
- A rust library that allows you to host the CLR and execute dotnet binaries.☆216Updated last month
- Command & Control server and agent written in Rust☆36Updated 2 years ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆274Updated last month
- RedLizard Rust TCP Reverse Shell Server/Client☆136Updated last year
- ROP-based sleep obfuscation to evade memory scanners☆349Updated 3 months ago
- Host CLR and run .NET binaries using Rust☆105Updated last week
- CobaltStrike beacon in rust☆185Updated 8 months ago
- Hide memory artifacts using ROP and hardware breakpoints.☆137Updated last year
- A Nim implementation of reflective PE-Loading from memory☆280Updated 8 months ago
- Some Rust program I wrote while learning Malware Development☆132Updated 3 months ago
- A cross platform C2 server written in Rust!☆45Updated last month
- Call Stack Spoofing for Rust with support #[no_std]☆144Updated last week
- Executables on Disk? Bleh 🤮☆100Updated last year