Suredials / RUSTVERSARYLinks
π¦ RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.
β31Updated last year
Alternatives and similar repositories for RUSTVERSARY
Users that are interested in RUSTVERSARY are comparing it to the libraries listed below
Sorting:
- Two simple plugins for wireshark that can help in Network Forensics CTFsβ12Updated 8 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.β139Updated 9 months ago
- RunPE implementation with multiple evasive techniques (2)β262Updated 3 months ago
- β225Updated 9 months ago
- The Shelf is a repository containing various tools, exploits, and scripts that Iβve gathered over the years. These are small but useful uβ¦β33Updated last week
- β164Updated 10 months ago
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.β11Updated 7 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systemsβ260Updated this week
- Obfuscate the bytes of your payload with an association dictionaryβ74Updated 2 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !β98Updated last month
- β94Updated last year
- A list of all Active Directory machines from HackTheBoxβ198Updated last month
- execute PE in memory Filelesslyβ50Updated 11 months ago
- Sliver CheatSheet for OSEPβ232Updated last month
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payloadβ47Updated 2 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.β171Updated 3 weeks ago
- Obex β Blocking unwanted DLLs in user modeβ280Updated 3 months ago
- The different ways to dump lsassβ203Updated 4 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β154Updated last year
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defenderβ29Updated last year
- β55Updated 2 years ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.β356Updated 4 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution typesβ107Updated 4 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to anyβ¦β104Updated 6 months ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.β13Updated 7 months ago
- Polymorphic Command & Controlβ101Updated 10 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloβ¦β213Updated 2 months ago
- β149Updated 3 months ago
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).β57Updated 4 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatinβ¦β120Updated 11 months ago