Idov31 / rustomwareLinks
Simple ransomware written in Rust. Part of the building a rustomware blog post.
☆35Updated 2 years ago
Alternatives and similar repositories for rustomware
Users that are interested in rustomware are comparing it to the libraries listed below
Sorting:
- using the gpu to hide your payload☆63Updated 3 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 3 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- ☆107Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- Compile shellcode into an exe file from Windows or Linux.☆72Updated 8 months ago
- EvtPsst☆55Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆59Updated 2 years ago
- ☆33Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- Hide memory artifacts using ROP and hardware breakpoints.☆147Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆44Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated 2 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 3 years ago
- API Hammering with C++20☆50Updated 3 years ago
- Windows internals and exploitation tricks☆112Updated 3 months ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Updated 2 years ago
- ☆113Updated 3 years ago
- The AMSI server for Avred☆33Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆89Updated 2 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- It's pointy and it hurts!☆126Updated 3 years ago
- Deleting Shadow Copies In Pure C++☆118Updated 3 years ago
- ☆61Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago