b1nhack / rust-shellcodeLinks
windows-rs shellcode loaders
☆379Updated last year
Alternatives and similar repositories for rust-shellcode
Users that are interested in rust-shellcode are comparing it to the libraries listed below
Sorting:
- CPP AV/EDR Killer☆451Updated last year
- A Windows potato to privesc☆387Updated last year
- PE to shellcode☆254Updated 10 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆419Updated last year
- Bypassing UAC with SSPI Datagram Contexts☆454Updated 2 years ago
- Open repository for learning dynamic shellcode loading (sample in many programming languages)☆267Updated 3 months ago
- An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memor…☆453Updated 6 months ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆395Updated 2 years ago
- Process injection alternative☆344Updated last year
- CobaltStrike beacon in rust☆207Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆289Updated 6 months ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆486Updated 5 months ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆320Updated last year
- Go shellcode loader that combines multiple evasion techniques☆385Updated 2 years ago
- Next Generation C2 Framework☆381Updated last week
- Collection of UAC Bypass Techniques Weaponized as BOFs☆573Updated last year
- Shellcode loader generator with multiples features☆496Updated 10 months ago
- A Beacon Object File (BOF) template for Visual Studio☆249Updated 2 months ago
- AdaptixFramework Extension Kit☆272Updated this week
- ☆338Updated 8 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆650Updated 2 months ago
- Fileless atexec, no more need for port 445☆396Updated last year
- Windows Token Stealing Expert☆481Updated last year
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆497Updated 2 years ago
- IoM implant, C2 Framework and Infrastructure☆226Updated last month
- A COFF loader made in Rust☆314Updated 2 months ago
- A BOF that runs unmanaged PEs inline☆657Updated last year
- Credential Guard Bypass Via Patching Wdigest Memory☆332Updated 2 years ago
- ☆316Updated 2 years ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆275Updated 6 months ago