EddieIvan01 / memexec
A library for loading and executing PE (Portable Executable) from memory without ever touching the disk
☆134Updated 4 years ago
Alternatives and similar repositories for memexec:
Users that are interested in memexec are comparing it to the libraries listed below
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆329Updated 10 months ago
- Dynamically invoke arbitrary unmanaged code☆327Updated last month
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆206Updated last year
- A rust library that allows you to host the CLR and execute dotnet binaries.☆210Updated 4 months ago
- Windows shellcode development in Rust☆282Updated 3 years ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆244Updated last year
- Load DLLs from memory with rust☆134Updated 2 years ago
- A rust library that allows you to delete your executable while it's running.☆89Updated last year
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆262Updated 5 months ago
- Call stack spoofing for Rust☆307Updated 4 months ago
- Black cat magic ฅ(^・ω・^ฅ ✿)☆53Updated 2 years ago
- Shellcode loader designed for evasion. Coded in Rust.☆121Updated last year
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆256Updated 11 months ago
- UDP implant☆65Updated 3 years ago
- Using fibers to run in-memory code.☆199Updated last year
- Rust For Windows Cheatsheet☆115Updated 2 months ago
- Simple Native Rust Reflective PE loader library☆39Updated last year
- Threadless Process Injection through entry point hijacking☆340Updated 4 months ago
- ROP-based sleep obfuscation to evade memory scanners☆326Updated 10 months ago
- Command & Control server and agent written in Rust☆34Updated 2 years ago
- Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)☆541Updated last year
- RedLizard Rust TCP Reverse Shell Server/Client☆133Updated last year
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆240Updated last year
- Hide memory artifacts using ROP and hardware breakpoints.☆135Updated last year
- ☆286Updated last year
- A COFF loader made in Rust☆259Updated 3 months ago
- x64 Assembly HalosGate direct System Caller to evade EDR UserLand hooks☆199Updated last year
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆92Updated 3 years ago