Kudaes / RustChainLinks
Hide memory artifacts using ROP and hardware breakpoints.
☆138Updated last year
Alternatives and similar repositories for RustChain
Users that are interested in RustChain are comparing it to the libraries listed below
Sorting:
- Reuse open handles to dynamically dump LSASS.☆246Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.☆100Updated 2 weeks ago
- Select any exported function in a dll as the new dll's entry point.☆79Updated 7 months ago
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library☆31Updated 2 years ago
- An example reference design for a proposed BOF PE☆168Updated last month
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆63Updated last month
- A COFF Loader written in Rust☆100Updated 3 weeks ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago
- Command & Control server and agent written in Rust☆36Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆72Updated 2 months ago
- ☆99Updated last year
- Some Rust program I wrote while learning Malware Development☆133Updated 4 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆145Updated 7 months ago
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆132Updated 3 months ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆145Updated 2 years ago
- It's pointy and it hurts!☆126Updated 2 years ago
- ☆141Updated 2 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 3 years ago
- Experiment on reproducing Obfuscate & Sleep☆145Updated 4 years ago
- ☆136Updated last year
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆196Updated 11 months ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆156Updated 4 years ago
- LdrLoadDll Unhooking☆129Updated 3 years ago
- ☆111Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆123Updated 2 years ago
- ☆124Updated last year
- Rust For Windows Cheatsheet☆120Updated 7 months ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆94Updated 2 years ago
- Template-based generation of shellcode loaders☆77Updated last year
- ☆115Updated 2 years ago