TheBotlyNoob / Rust-PrivescLinks
privilege escalation POCs built in Rust.
☆19Updated 3 years ago
Alternatives and similar repositories for Rust-Privesc
Users that are interested in Rust-Privesc are comparing it to the libraries listed below
Sorting:
- Donut generator in rust.☆27Updated 3 years ago
- Inject a shellcode in a remote process using Process Hollowing.☆54Updated 4 years ago
- Command & Control server and agent written in Rust☆35Updated 3 years ago
- Collection of Rust repos useful for Red Teamers.☆34Updated 3 years ago
- Select any exported function in a dll as the new dll's entry point.☆81Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- Hide memory artifacts using ROP and hardware breakpoints.☆147Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆102Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆108Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated 11 months ago
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Updated 3 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆24Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆51Updated 2 years ago
- Rust Implementation of SharpDllProxy for DLL Proxying Technique☆29Updated 3 years ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆93Updated 4 years ago
- Rust bindings to Microsoft Windows users / groups management API☆34Updated 2 years ago
- idk man this was the default github name☆35Updated 2 years ago
- Just some Rust process injector POCs, nothing weird.☆81Updated 3 years ago
- Linux Sleep Obfuscation☆106Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Updated 2 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆81Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Executables on Disk? Bleh 🤮☆111Updated 2 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83Updated 2 years ago
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Updated 3 years ago
- Retrieve host information from NTLM☆32Updated 4 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆87Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆84Updated 4 years ago