b1tg / Ox-C2Links
Command & Control server and agent written in Rust
☆36Updated 2 years ago
Alternatives and similar repositories for Ox-C2
Users that are interested in Ox-C2 are comparing it to the libraries listed below
Sorting:
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library☆31Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆63Updated last month
- Rust Implementation of SharpDllProxy for DLL Proxying Technique☆30Updated 2 years ago
- Template-based generation of shellcode loaders☆77Updated last year
- Hide memory artifacts using ROP and hardware breakpoints.☆138Updated last year
- Donut generator in rust.☆26Updated 3 years ago
- A COFF Loader written in Rust☆100Updated 3 weeks ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82Updated 2 years ago
- Inject a shellcode in a remote process using Process Hollowing.☆50Updated 3 years ago
- Select any exported function in a dll as the new dll's entry point.☆79Updated 7 months ago
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆65Updated 2 years ago
- A runas implementation with extra features in Rust☆41Updated last month
- ☆99Updated last year
- remote process injections using pool party techniques☆60Updated 3 months ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 3 years ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆145Updated 7 months ago
- Reuse open handles to dynamically dump LSASS.☆246Updated last year
- ☆124Updated last year
- Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.☆19Updated 3 years ago
- Just some Rust process injector POCs, nothing weird.☆80Updated 3 years ago
- Executables on Disk? Bleh 🤮☆100Updated 2 years ago
- Rusty Impersonate☆96Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆128Updated 2 years ago
- Linker for Beacon Object Files☆70Updated this week
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆88Updated 2 years ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆35Updated 2 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- Detect EDR's exceptions by inspecting processes' loaded modules☆130Updated last year
- Your syscall factory☆123Updated last week