Suredials / RUSTVERSARYLinks
🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.
☆30Updated last year
Alternatives and similar repositories for RUSTVERSARY
Users that are interested in RUSTVERSARY are comparing it to the libraries listed below
Sorting:
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆28Updated last year
- RunPE implementation with multiple evasive techniques☆246Updated 2 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆46Updated last year
- Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas☆28Updated 9 months ago
- ☆222Updated 8 months ago
- A guide to learning antivirus evasion☆56Updated 8 months ago
- ☆164Updated 8 months ago
- Obfuscate the bytes of your payload with an association dictionary☆72Updated 3 weeks ago
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Updated 7 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆137Updated 8 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆209Updated last month
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆442Updated 6 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆170Updated last month
- Embed a payload inside a PNG file☆360Updated last year
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆97Updated 5 months ago
- Sliver CheatSheet for OSEP☆210Updated last month
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆115Updated last year
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆43Updated last month
- Execute commands interactively on remote Windows machines using the WinRM protocol☆282Updated last month
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆309Updated last week
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆13Updated 5 months ago
- Obex – Blocking unwanted DLLs in user mode☆266Updated 2 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆14Updated last month
- Everything from my OSEP study.☆179Updated 10 months ago
- Generate an Alphabetical Polymorphic Shellcode☆130Updated 3 months ago
- Polymorphic Command & Control☆100Updated 8 months ago
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆56Updated 3 months ago
- What the name says....☆103Updated last year
- ☆370Updated last month