darkr4y / OffensiveZigLinks
Some attempts at using Zig(https://ziglang.org/) in penetration testing.
☆249Updated last year
Alternatives and similar repositories for OffensiveZig
Users that are interested in OffensiveZig are comparing it to the libraries listed below
Sorting:
- bof-launcher - library for loading, executing and in-memory masking BOFs on Windows (x64, x86) and Linux (x64, x86, aarch64, arm). Ready …☆256Updated last week
- This project provides some code examples of Zig for malwares, hacking, and red teaming. ⚡☆172Updated last week
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆483Updated last week
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆184Updated 2 years ago
- Nim Library for Offensive Security Development☆198Updated 2 years ago
- ZYRA: Your Runtime Armor. ZYRA is an Zig-written obfuscator/packer for executable binaries.☆61Updated 2 months ago
- Very basic dll injector written in zig, for windows. Assumes the injector, target process, and dll are of the same bitness. Usage: ./inje…☆29Updated 5 years ago
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆161Updated 4 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆166Updated 4 years ago
- Call stack spoofing for Rust☆347Updated 8 months ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆352Updated last year
- Threadless Process Injection through entry point hijacking☆348Updated last year
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆241Updated 2 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆226Updated 2 years ago
- DLL sideloading/proxying with Nim!☆176Updated 2 years ago
- Dynamically invoke arbitrary unmanaged code☆357Updated 11 months ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆232Updated 7 months ago
- Evasion by machine code de-optimization.☆408Updated last year
- grim reaper c2☆339Updated 2 years ago
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆241Updated 2 years ago
- ☆46Updated 4 years ago
- Load Windows DLL from memory☆136Updated 2 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆217Updated 3 years ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆300Updated 4 months ago
- miscellaneous scripts and programs☆258Updated 9 months ago
- Using fibers to run in-memory code.☆220Updated 2 years ago
- ☆293Updated last year
- Get fresh Syscalls from a fresh ntdll.dll copy☆235Updated 3 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆607Updated 2 years ago
- PE Crypter written in Nim☆99Updated 4 years ago