Nariod / RustPackerLinks
Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.
☆311Updated 6 months ago
Alternatives and similar repositories for RustPacker
Users that are interested in RustPacker are comparing it to the libraries listed below
Sorting:
- Dynamically invoke arbitrary unmanaged code☆357Updated last year
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆354Updated last year
- ROP-based sleep obfuscation to evade memory scanners☆370Updated 6 months ago
- A COFF loader made in Rust☆316Updated 4 months ago
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆377Updated 8 months ago
- Threadless Process Injection through entry point hijacking☆349Updated last year
- shellcode loader for your evasion needs☆350Updated 8 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆194Updated last year
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆398Updated 2 years ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆275Updated last year
- Open Source C&C Specification☆277Updated 10 months ago
- transform your payload into ipv4/ipv6/mac arrays☆237Updated 3 years ago
- Using fibers to run in-memory code.☆240Updated 2 years ago
- Some Rust program I wrote while learning Malware Development☆159Updated 10 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆364Updated 2 years ago
- ☆259Updated last year
- Generate an obfuscated DLL that will disable AMSI & ETW☆330Updated last year
- Shellcode loader designed for evasion. Coded in Rust.☆133Updated 2 years ago
- Apply a divide and conquer approach to bypass EDRs☆288Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆263Updated 2 years ago
- Shaco is a linux agent for havoc☆168Updated 2 years ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆401Updated last month
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆362Updated 10 months ago
- Shellcode Loader with Indirect Dynamic syscall Implementation , shellcode in MAC format, API resolving from PEB, Syscall calll and syscal…☆319Updated 2 years ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆312Updated 2 years ago
- A BOF that runs unmanaged PEs inline☆676Updated last year
- Stealthily inject shellcode into an executable☆428Updated 2 months ago
- Performing Indirect Clean Syscalls☆595Updated 2 years ago
- Call stack spoofing for Rust☆347Updated 10 months ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆228Updated 2 years ago