Irate-Walrus / stardust-rsLinks
An i686 & x86_64 position independent implant template for Rust π¦
β32Updated 6 months ago
Alternatives and similar repositories for stardust-rs
Users that are interested in stardust-rs are comparing it to the libraries listed below
Sorting:
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.β38Updated 10 months ago
- A Rust crate to parse user-mode minidump files generated on Windowsβ17Updated 2 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.β103Updated 10 months ago
- A pointer encryption library intended for Red Team implant design in Rust.β63Updated 3 months ago
- Rust template/library for implementing your own COFF loaderβ71Updated 11 months ago
- Linker for Beacon Object Filesβ146Updated this week
- A runas implementation with extra features in Rustβ53Updated 2 months ago
- A collection of position independent coding resourcesβ106Updated 2 months ago
- Dynamically invoke arbitrary code in Rust (Dinvoke)β99Updated last month
- A reflective DLL development template for the Rust programming languageβ111Updated 2 months ago
- 64-bit, position-independent implant template for Windows in Rust.β162Updated last month
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features positβ¦β59Updated 10 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).β116Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.β72Updated 2 months ago
- A COFF Loader written in Rustβ133Updated last month
- shell code exampleβ67Updated last month
- Host CLR and run .NET binaries using Rustβ148Updated 3 weeks ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitorβ107Updated last year
- A Rust port of LayeredSyscall β performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.β160Updated last year
- ForsHopsβ59Updated 9 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Executionβ42Updated 3 months ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEHβ136Updated 4 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)β120Updated 2 months ago
- β86Updated 11 months ago
- β100Updated 2 years ago
- β99Updated last year
- β54Updated last year
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Libraryβ33Updated 3 years ago
- Early Bird APC Injection in Rustβ63Updated last year
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stackβ94Updated 3 weeks ago