b1tg / rust-windows-shellcodeLinks
Windows shellcode development in Rust
☆307Updated 4 years ago
Alternatives and similar repositories for rust-windows-shellcode
Users that are interested in rust-windows-shellcode are comparing it to the libraries listed below
Sorting:
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆354Updated last year
- Dynamically invoke arbitrary unmanaged code☆357Updated last year
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆161Updated 5 years ago
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆275Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆229Updated 2 years ago
- Threadless Process Injection through entry point hijacking☆349Updated last year
- Load DLLs from memory with rust☆144Updated 3 years ago
- Reuse open handles to dynamically dump LSASS.☆246Updated last year
- ☆299Updated last year
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆311Updated 6 months ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆401Updated last month
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆234Updated last year
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Updated 3 years ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆236Updated 9 months ago
- A COFF loader made in Rust☆316Updated 4 months ago
- ROP-based sleep obfuscation to evade memory scanners☆370Updated 6 months ago
- Shellcode loader designed for evasion. Coded in Rust.☆133Updated 2 years ago
- Apply a divide and conquer approach to bypass EDRs☆288Updated 2 years ago
- A Nim implementation of reflective PE-Loading from memory☆297Updated last year
- Using fibers to run in-memory code.☆240Updated 2 years ago
- Move CS beacon to GPU memory when sleeping☆250Updated 4 years ago
- Leaked Windows processes handles identification tool☆290Updated 3 years ago
- Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)☆573Updated 2 years ago
- An implementation and proof-of-concept of Process Forking.☆230Updated 4 years ago
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆372Updated 3 years ago
- A shellcode function to encrypt a running process image when sleeping.☆342Updated 4 years ago
- Call stack spoofing for Rust☆347Updated 10 months ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆458Updated 4 years ago
- A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this proje…☆463Updated 4 years ago
- A way to delete a locked file, or current running executable, on disk.☆614Updated last month