TheBotlyNoob / Rust-PrivescLinks
privilege escalation POCs built in Rust.
☆19Updated 3 years ago
Alternatives and similar repositories for Rust-Privesc
Users that are interested in Rust-Privesc are comparing it to the libraries listed below
Sorting:
- Inject a shellcode in a remote process using Process Hollowing.☆54Updated 4 years ago
- Command & Control server and agent written in Rust☆35Updated 3 years ago
- Collection of Rust repos useful for Red Teamers.☆34Updated 3 years ago
- Donut generator in rust.☆27Updated 3 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- Retrieve host information from NTLM☆32Updated 4 years ago
- Select any exported function in a dll as the new dll's entry point.☆81Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- Hide memory artifacts using ROP and hardware breakpoints.☆147Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆90Updated 3 years ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆93Updated 4 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 3 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆84Updated 4 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆15Updated last year
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Updated 3 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆59Updated 2 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆85Updated 2 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆109Updated 2 years ago
- Rust implementation of the Process Herpaderping☆24Updated 2 years ago
- Executables on Disk? Bleh 🤮☆111Updated 2 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Updated 2 years ago
- ☆30Updated 3 years ago
- ☆61Updated 2 years ago