Kudaes / rust_tips_and_tricks
Rust For Windows Cheatsheet
☆116Updated 4 months ago
Alternatives and similar repositories for rust_tips_and_tricks:
Users that are interested in rust_tips_and_tricks are comparing it to the libraries listed below
- DLL proxying for lazy people☆155Updated 3 months ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆209Updated 2 years ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆136Updated 4 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆257Updated 6 months ago
- Some Rust program I wrote while learning Malware Development☆127Updated last month
- 64-bit, position-independent implant template for Windows in Rust.☆116Updated 5 months ago
- Host CLR and run .NET binaries using Rust☆92Updated 3 weeks ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆93Updated last year
- Exploitation of process killer drivers☆198Updated last year
- Call stack spoofing for Rust☆326Updated last month
- Using fibers to run in-memory code.☆205Updated last year
- Malware?☆69Updated 5 months ago
- Dynamically invoke arbitrary unmanaged code☆336Updated 4 months ago
- Activation Context Hijack☆150Updated 3 months ago
- Template-based generation of shellcode loaders☆76Updated 11 months ago
- A set of programs for analyzing common vulnerabilities in COM☆200Updated 6 months ago
- Rusty Impersonate☆95Updated last year
- An example reference design for a proposed BOF PE☆126Updated last month
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆106Updated 6 months ago
- Shellcode loader that executes embedded Lua from Rust.☆111Updated 3 months ago
- ☆96Updated 2 months ago
- Dynamically invoke arbitrary code with Rust tricks, #[no_std] support, and compatibility for x64, x86, ARM64 and WoW64 (DInvoke)☆56Updated last week
- Find DLLs with RWX section☆78Updated last year
- A Mythic Agent written in PIC C.☆184Updated last month
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆72Updated last month
- Hide memory artifacts using ROP and hardware breakpoints.☆137Updated last year
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆98Updated last year
- kernel callback removal (Bypassing EDR Detections)☆130Updated this week
- Detect EDR's exceptions by inspecting processes' loaded modules☆130Updated last year
- 32bit MIPS I VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆111Updated 3 months ago