LukeDSchenk / rust-backdoors
More bind and reverse shells! This time written in Rust.
☆50Updated 2 years ago
Alternatives and similar repositories for rust-backdoors:
Users that are interested in rust-backdoors are comparing it to the libraries listed below
- A cross platform C2 server written in Rust!☆36Updated 2 months ago
- RedLizard Rust TCP Reverse Shell Server/Client☆133Updated last year
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆92Updated 3 years ago
- Linux Enumeration / Privilege escalation tool☆23Updated 4 years ago
- rcat☆64Updated 2 years ago
- Shellcode loader designed for evasion. Coded in Rust.☆121Updated last year
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆146Updated 3 years ago
- UDP implant☆65Updated 3 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆133Updated 10 months ago
- Executables on Disk? Bleh 🤮☆98Updated last year
- Windows Privilege Escalation☆54Updated 2 years ago
- Rust in-memory dumper☆105Updated last year
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆142Updated this week
- Just some Rust process injector POCs, nothing weird.☆80Updated 2 years ago
- A Rust-based dropper for shellcode payloads.☆61Updated 4 months ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated last year
- A variety of AV evasion techniques written in C# for practice.☆80Updated 3 years ago
- ☆66Updated 4 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- Command & Control server and agent written in Rust☆34Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆67Updated 4 months ago
- CLI monitor for windows process- & file activity☆78Updated 4 years ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆189Updated last week
- A dirty PoC for a reverse shell with cool features in Rust☆178Updated 4 months ago
- ☆34Updated last year
- Impersonating authentication over HTTP and/or named pipes.☆125Updated 3 years ago
- AV EVASION TECHNIQUES☆74Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆168Updated last year