Call stack spoofing for Rust
☆363Feb 7, 2025Updated last year
Alternatives and similar repositories for Unwinder
Users that are interested in Unwinder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dynamically invoke arbitrary unmanaged code☆361Feb 19, 2026Updated 2 months ago
- ROP-based sleep obfuscation to evade memory scanners☆381Jun 22, 2025Updated 10 months ago
- PoC Implementation of a fully dynamic call stack spoofer☆953Jul 20, 2024Updated last year
- Host CLR and run .NET binaries using Rust☆154Dec 23, 2025Updated 4 months ago
- Using fibers to run in-memory code.☆244Oct 19, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆566Apr 8, 2025Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆284Sep 18, 2024Updated last year
- ☆102Oct 7, 2023Updated 2 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆265Jun 29, 2024Updated last year
- A rust library that allows you to host the CLR and execute dotnet binaries.☆235Mar 12, 2025Updated last year
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆366Mar 2, 2024Updated 2 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆236Mar 23, 2023Updated 3 years ago
- Hide memory artifacts using ROP and hardware breakpoints.☆146Oct 20, 2023Updated 2 years ago
- Call Stack Spoofing for Rust☆216Jan 28, 2026Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆138Mar 3, 2025Updated last year
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆268Oct 16, 2024Updated last year
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆164Oct 31, 2024Updated last year
- A PoC implementation for dynamically masking call stacks with timers.☆310Feb 13, 2023Updated 3 years ago
- Activation Context Hijack☆172Aug 3, 2025Updated 9 months ago
- CobaltStrike beacon in rust☆207Aug 10, 2024Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆236Feb 12, 2025Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆449Dec 21, 2023Updated 2 years ago
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆284Feb 8, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Cobalt Strike UDRL for memory scanner evasion.☆1,014Jun 4, 2024Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆234Oct 18, 2022Updated 3 years ago
- A COFF loader made in Rust☆333Mar 14, 2026Updated last month
- Rust For Windows Cheatsheet☆121Nov 26, 2025Updated 5 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆325Jan 17, 2024Updated 2 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆535Aug 1, 2022Updated 3 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆623Sep 26, 2023Updated 2 years ago
- Linux Sleep Obfuscation☆115Jan 7, 2024Updated 2 years ago
- DLL proxying for lazy people☆203Dec 1, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Apply a divide and conquer approach to bypass EDRs☆286Oct 19, 2023Updated 2 years ago
- A modern 32/64-bit position independent implant template☆1,320Mar 21, 2025Updated last year
- Threadless Process Injection through entry point hijacking☆353Sep 10, 2024Updated last year
- For when DLLMain is the only way☆430Oct 29, 2024Updated last year
- Load a dynamic library from memory by modifying the native Windows loader☆293Apr 26, 2026Updated last week
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆266Apr 29, 2023Updated 3 years ago
- A BOF to determine Windows Defender exclusions.☆255Jun 25, 2023Updated 2 years ago