Suredials / RUSTVERSARYLinks
🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.
☆30Updated last year
Alternatives and similar repositories for RUSTVERSARY
Users that are interested in RUSTVERSARY are comparing it to the libraries listed below
Sorting:
- ☆164Updated 11 months ago
- RunPE implementation with multiple evasive techniques (2)☆268Updated 4 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆139Updated 10 months ago
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆12Updated 8 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆217Updated 3 months ago
- The different ways to dump lsass☆236Updated 5 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆173Updated last month
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆152Updated last year
- ☆238Updated 10 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆106Updated 2 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆183Updated 2 years ago
- A guide to learning antivirus evasion☆62Updated 10 months ago
- collection of blogs about malware development and analysis☆63Updated 2 months ago
- ⚠️ Malware Development training ⚠️☆40Updated 11 months ago
- ☆154Updated 4 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆312Updated last month
- Sliver CheatSheet for OSEP☆242Updated 2 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆45Updated 2 years ago
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆423Updated 3 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆111Updated 7 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆177Updated 8 months ago
- PowerShell Obfuscator☆229Updated 5 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆276Updated 3 weeks ago
- Compile SharpHound and others on Linux☆24Updated last year
- Polymorphic Command & Control☆102Updated 11 months ago
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆33Updated last month
- Execute commands interactively on remote Windows machines using the WinRM protocol☆323Updated 2 weeks ago
- A solution to create obfuscated reverse shells for PowerShell.☆83Updated 3 years ago
- ☆96Updated last year