Kudaes / rust_tips_and_tricksLinks
Rust For Windows Cheatsheet
☆120Updated 7 months ago
Alternatives and similar repositories for rust_tips_and_tricks
Users that are interested in rust_tips_and_tricks are comparing it to the libraries listed below
Sorting:
- DLL proxying for lazy people☆175Updated 6 months ago
- Some Rust program I wrote while learning Malware Development☆133Updated 4 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆151Updated 7 months ago
- Using fibers to run in-memory code.☆210Updated last year
- 64-bit, position-independent implant template for Windows in Rust.☆137Updated last month
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆265Updated 9 months ago
- Host CLR and run .NET binaries using Rust☆109Updated this week
- ☆190Updated last year
- Exploitation of process killer drivers☆201Updated last year
- Rusty Impersonate☆96Updated 2 years ago
- Dynamically invoke arbitrary code and use various tricks written idiomatically in Rust (Dinvoke)☆79Updated this week
- Activation Context Hijack☆155Updated 6 months ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆219Updated 2 years ago
- Reuse open handles to dynamically dump LSASS.☆246Updated last year
- Template-based generation of shellcode loaders☆77Updated last year
- Dynamically invoke arbitrary unmanaged code☆348Updated 7 months ago
- Shellcode loader designed for evasion. Coded in Rust.☆130Updated 2 years ago
- An example reference design for a proposed BOF PE☆175Updated 2 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆218Updated 4 months ago
- Call stack spoofing for Rust☆335Updated 4 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆82Updated 4 months ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆145Updated 2 years ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆170Updated last week
- Your syscall factory☆123Updated last week
- ☆188Updated last year
- A reflective DLL development template for the Rust programming language☆97Updated last month
- ROP-based sleep obfuscation to evade memory scanners☆357Updated this week
- Detect EDR's exceptions by inspecting processes' loaded modules☆130Updated last year
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆133Updated 3 months ago
- A set of programs for analyzing common vulnerabilities in COM☆215Updated 9 months ago