Irate-Walrus / stardust-rs
An i686 & x86_64 position independent implant template for Rust π¦
β23Updated last month
Alternatives and similar repositories for stardust-rs:
Users that are interested in stardust-rs are comparing it to the libraries listed below
- ForsHopsβ41Updated last month
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.β76Updated 2 months ago
- A Rust crate to parse user-mode minidump files generated on Windowsβ14Updated last month
- β99Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.β32Updated last month
- A COFF Loader written in Rustβ97Updated 3 weeks ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features positβ¦β53Updated last month
- Dynamically resolve API function addresses at runtime in a secure manner.β54Updated 6 months ago
- β57Updated 3 months ago
- shell code exampleβ46Updated last week
- Dynamically invoke arbitrary code with Rust tricks, #[no_std] support, and compatibility for x64, x86, ARM64 and WoW64 (DInvoke)β71Updated this week
- Rust template/library for implementing your own COFF loaderβ50Updated 3 months ago
- converts sRDI compatible dlls to shellcodeβ23Updated 3 months ago
- a demo module for the kaine agent to execute and inject assembly modulesβ38Updated 7 months ago
- Exploiting the KsecDD Windows driver through Server Silosβ67Updated 5 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).β51Updated 3 months ago
- β29Updated 4 months ago
- remote process injections using pool party techniquesβ58Updated 2 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Executionβ42Updated 9 months ago
- early cascade injection PoC based on Outflanks blog post, in rustβ57Updated 5 months ago
- A synergized Visual Studio and Rust development environmentβ18Updated 3 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial β¦β48Updated 3 months ago
- β86Updated 8 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows β built in Rust.β63Updated 3 months ago
- A process injection technique using only thread context manipulationβ29Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assemblyβ60Updated last year
- stack spoofingβ84Updated 5 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.β57Updated 2 weeks ago
- Shellcode Loader Utilizing ETW Eventsβ63Updated 2 months ago
- β61Updated 10 months ago