TheBotlyNoob / Rust-PrivescLinks
privilege escalation POCs built in Rust.
☆19Updated 3 years ago
Alternatives and similar repositories for Rust-Privesc
Users that are interested in Rust-Privesc are comparing it to the libraries listed below
Sorting:
- Donut generator in rust.☆27Updated 3 years ago
- Inject a shellcode in a remote process using Process Hollowing.☆53Updated 4 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- Command & Control server and agent written in Rust☆34Updated 3 years ago
- Retrieve host information from NTLM☆32Updated 4 years ago
- Select any exported function in a dll as the new dll's entry point.☆82Updated 11 months ago
- Collection of Rust repos useful for Red Teamers.☆34Updated 3 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated 2 years ago
- Hide memory artifacts using ROP and hardware breakpoints.☆147Updated last year
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆102Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆110Updated 2 years ago
- Rust bindings to Microsoft Windows users / groups management API☆34Updated last year
- Rust Implementation of SharpDllProxy for DLL Proxying Technique☆29Updated 2 years ago
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated 9 months ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆88Updated 3 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆14Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆87Updated last year
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆84Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆95Updated 3 years ago
- Executables on Disk? Bleh 🤮☆105Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆83Updated 3 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆84Updated 2 years ago
- Rust implementation of the Process Herpaderping☆24Updated 2 years ago