Nariod / RustPackerLinks
Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.
☆315Updated 6 months ago
Alternatives and similar repositories for RustPacker
Users that are interested in RustPacker are comparing it to the libraries listed below
Sorting:
- Dynamically invoke arbitrary unmanaged code☆356Updated last year
- A COFF loader made in Rust☆321Updated 5 months ago
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆380Updated 8 months ago
- Threadless Process Injection through entry point hijacking☆351Updated last year
- shellcode loader for your evasion needs☆350Updated 8 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆195Updated last year
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆356Updated last year
- ROP-based sleep obfuscation to evade memory scanners☆373Updated 6 months ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆407Updated 2 years ago
- transform your payload into ipv4/ipv6/mac arrays☆240Updated 3 years ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆278Updated last year
- Open Source C&C Specification☆278Updated 10 months ago
- Some Rust program I wrote while learning Malware Development☆159Updated 11 months ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆329Updated last year
- ☆259Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆365Updated 2 years ago
- Using fibers to run in-memory code.☆239Updated 2 years ago
- A BOF that runs unmanaged PEs inline☆677Updated last year
- Stealthily inject shellcode into an executable☆438Updated 3 months ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆603Updated last year
- Shellcode loader designed for evasion. Coded in Rust.☆133Updated 2 years ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆454Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆259Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆268Updated 2 years ago
- Apply a divide and conquer approach to bypass EDRs☆288Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆388Updated last year
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆401Updated last month
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆402Updated last week
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆380Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆593Updated last year