SecSamDev / self-modifying-malwareLinks
Self-modifying malware in Rust
☆28Updated 3 years ago
Alternatives and similar repositories for self-modifying-malware
Users that are interested in self-modifying-malware are comparing it to the libraries listed below
Sorting:
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 3 years ago
- A rust library that allows you to delete your executable while it's running.☆89Updated 2 years ago
- A PoC packer written in Rust!☆73Updated 3 years ago
- Linux Enumeration / Privilege escalation tool☆25Updated 5 years ago
- UAC Bypass using CMSTP in Rust☆32Updated 9 months ago
- examples of using radius2 to solve reversing challenges☆35Updated 8 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 7 months ago
- some AV / EDR / analysis studies☆10Updated 2 years ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆69Updated 8 months ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆66Updated last year
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆100Updated 3 months ago
- Rust For Windows Cheatsheet☆121Updated 10 months ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago
- ☆18Updated last year
- A rust based DLL injection project☆30Updated 3 years ago
- using the gpu to hide your payload☆59Updated 3 years ago
- Remote Command executor☆78Updated 2 years ago
- Command & Control server and agent written in Rust☆35Updated 2 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆32Updated 9 months ago
- Hide memory artifacts using ROP and hardware breakpoints.☆148Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆160Updated 4 years ago
- ☆38Updated 9 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆98Updated 3 months ago
- Memory Obfuscation in Rust☆255Updated 3 weeks ago
- DNS over HTTPS targeted malware (only runs once)☆97Updated 2 years ago
- Using fibers to run in-memory code.☆220Updated last year
- Rust implementation of lazy_importer☆57Updated 2 years ago
- Inject a shellcode in a remote process using Process Hollowing.☆54Updated 4 years ago