b1tg / Ox-C2
Command & Control server and agent written in Rust
☆36Updated 2 years ago
Alternatives and similar repositories for Ox-C2:
Users that are interested in Ox-C2 are comparing it to the libraries listed below
- A work in progress BOF/COFF loader in Rust☆47Updated 2 years ago
- Inject a shellcode in a remote process using Process Hollowing.☆45Updated 3 years ago
- Template-based generation of shellcode loaders☆76Updated 11 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆62Updated 2 months ago
- Rust Implementation of SharpDllProxy for DLL Proxying Technique☆30Updated 2 years ago
- A COFF Loader written in Rust☆63Updated last week
- I have documented all of the AMSI patches that I learned till now☆71Updated last year
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library☆27Updated 2 years ago
- Donut generator in rust.☆26Updated 3 years ago
- Host CLR and run .NET binaries using Rust☆92Updated 3 weeks ago
- Collection of Rust repos useful for Red Teamers.☆32Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆85Updated 2 years ago
- Shellcode loader designed for evasion. Coded in Rust.☆125Updated 2 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆72Updated last month
- ☆98Updated last year
- ☆121Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆144Updated 2 years ago
- Create Anti-Copy DRM Malware☆54Updated 7 months ago
- remote process injections using pool party techniques☆55Updated last month
- Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.☆19Updated 3 years ago
- Executables on Disk? Bleh 🤮☆98Updated last year
- ☆47Updated 2 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆31Updated 3 weeks ago
- API Hammering with C++20☆45Updated 2 years ago
- Sleep Obfuscation☆43Updated 2 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆91Updated 2 years ago
- BYOVD collection☆23Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- ShellcodeFluctuation PoC ported to Nim☆75Updated 2 years ago