Whitecat18 / Rust-for-Malware-DevelopmentLinks
This repository contains complete resources and coding practices for malware development using Rust π¦.
β2,618Updated this week
Alternatives and similar repositories for Rust-for-Malware-Development
Users that are interested in Rust-for-Malware-Development are comparing it to the libraries listed below
Sorting:
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust π¦β1,706Updated last month
- Rust Weaponization for Red Team Engagements.β2,902Updated last year
- β οΈ malware developmentβ595Updated last year
- A workshop about Malware Developmentβ1,700Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDRβ2,893Updated 4 months ago
- Organized list of my malware development resourcesβ1,602Updated 3 years ago
- Pure Malware Development Resource Collectionsβ359Updated 7 months ago
- Malware Development for Ethical Hackers, published by Packtβ364Updated 8 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inteβ¦β1,089Updated this week
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managemβ¦β1,348Updated 10 months ago
- Cybersecurity oriented awesome listβ2,250Updated this week
- Collection of various malicious functionality to aid in malware developmentβ1,725Updated last year
- Awesome EDR Bypass Resources For Ethical Hackingβ1,267Updated 2 months ago
- π§ββοΈ Node.js Command & Control for Script-Jacking Vulnerable Electron Applicationsβ1,179Updated 2 months ago
- This is a repository of resource about Malware techniquesβ806Updated 2 years ago
- Windows Kernel Rootkit in Rustβ640Updated this week
- OSWE, OSEP, OSED, OSEEβ3,411Updated 4 months ago
- EDR Lab for Experimentation Purposesβ1,335Updated last month
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation incβ¦β716Updated 2 weeks ago
- Windows Local Privilege Escalation Cookbookβ1,166Updated 7 months ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.β897Updated 4 years ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.β370Updated this week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Powerβ¦β798Updated 5 months ago
- Conference presentation slidesβ2,212Updated this week
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.β2,732Updated this week
- A collection of resources to learn Reverse Engineering from start!β1,290Updated 5 months ago
- β1,691Updated this week
- The essential toolkit for reversing, malware analysis, and crackingβ909Updated 2 months ago
- Reverse Engineering and Malware Analysis Roadmapβ394Updated 2 months ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compilβ¦β1,047Updated last year