Whitecat18 / Rust-for-Malware-Development
This repository contains my complete resources and coding practices for malware development using Rust π¦.
β1,434Updated this week
Related projects β
Alternatives and complementary repositories for Rust-for-Malware-Development
- π¦ | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rustβ1,251Updated last week
- Rust Weaponization for Red Team Engagements.β2,711Updated 6 months ago
- A workshop about Malware Developmentβ1,581Updated last year
- Cybersecurity oriented awesome listβ1,353Updated this week
- β οΈ malware developmentβ457Updated 5 months ago
- This map lists the essential techniques to bypass anti-virus and EDRβ2,330Updated 10 months ago
- Windows Local Privilege Escalation Cookbookβ967Updated 7 months ago
- Organized list of my malware development resourcesβ1,430Updated 2 years ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.β2,342Updated this week
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managemβ¦β922Updated last month
- Collection of various malicious functionality to aid in malware developmentβ1,493Updated 8 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.β638Updated 2 months ago
- Collection of knowledge about information securityβ570Updated this week
- Awesome EDR Bypass Resources For Ethical Hackingβ920Updated this week
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.β744Updated 3 years ago
- OSCP Cheatsheet by Sai Sathvikβ944Updated last month
- Red team Interview Questionsβ593Updated 3 months ago
- Little user-mode AV/EDR evasion lab for training & learning purposesβ994Updated 6 months ago
- The Network Execution Toolβ3,212Updated this week
- Active Directory and Internal Pentest Cheatsheetsβ998Updated this week
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. β¦β760Updated 9 months ago
- Malware Development for Ethical Hackers, published by Packtβ209Updated 3 months ago
- Notion as a platform for offensive operationsβ1,124Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ1,813Updated 2 weeks ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.β1,244Updated 2 weeks ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compilβ¦β854Updated 3 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.β1,148Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Powerβ¦β638Updated 5 months ago
- Sticky notes for pentesting, bug bounty, CTF.β620Updated this week
- Golang library for malware developmentβ320Updated 9 months ago