b1tg / rust-windows-shellcode
Windows shellcode development in Rust
☆287Updated 4 years ago
Alternatives and similar repositories for rust-windows-shellcode:
Users that are interested in rust-windows-shellcode are comparing it to the libraries listed below
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆334Updated last year
- Dynamically invoke arbitrary unmanaged code☆336Updated 4 months ago
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆262Updated last year
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆143Updated 4 years ago
- Threadless Process Injection through entry point hijacking☆343Updated 6 months ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆227Updated 3 months ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆209Updated 2 years ago
- ROP-based sleep obfuscation to evade memory scanners☆337Updated last month
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆266Updated 8 months ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆248Updated last year
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆332Updated 3 months ago
- Shellcode loader designed for evasion. Coded in Rust.☆125Updated 2 years ago
- ☆505Updated 4 months ago
- Load DLLs from memory with rust☆135Updated 2 years ago
- Apply a divide and conquer approach to bypass EDRs☆278Updated last year
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆468Updated 2 years ago
- Another shellcode runner 🦀 🐚☆147Updated 3 years ago
- Call stack spoofing for Rust☆328Updated last month
- ☆290Updated last year
- Rust For Windows Cheatsheet☆116Updated 4 months ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆213Updated 2 weeks ago
- A COFF loader made in Rust☆288Updated 5 months ago
- Move CS beacon to GPU memory when sleeping☆243Updated 3 years ago
- Using fibers to run in-memory code.☆205Updated last year
- Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)☆546Updated last year
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆660Updated last year
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆364Updated 2 years ago
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆327Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆633Updated 2 years ago
- x64 Assembly HalosGate direct System Caller to evade EDR UserLand hooks☆204Updated 2 years ago