darkr4y / OffensiveZigLinks
Some attempts at using Zig(https://ziglang.org/) in penetration testing.
☆239Updated 11 months ago
Alternatives and similar repositories for OffensiveZig
Users that are interested in OffensiveZig are comparing it to the libraries listed below
Sorting:
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆369Updated 2 months ago
- Beacon Object File (BOF) launcher - library for executing BOF files in C/Zig/Rust/Go/C++ applications☆216Updated this week
- Very basic dll injector written in zig, for windows. Assumes the injector, target process, and dll are of the same bitness. Usage: ./inje…☆29Updated 5 years ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆339Updated last year
- Nim Library for Offensive Security Development☆198Updated last year
- This project provides some code examples of Zig for malwares, hacking, and red teaming. ⚡☆127Updated this week
- Dynamically invoke arbitrary unmanaged code☆348Updated 7 months ago
- Threadless Process Injection through entry point hijacking☆346Updated 9 months ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆167Updated 3 years ago
- Call stack spoofing for Rust☆335Updated 4 months ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆231Updated last year
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆240Updated last year
- grim reaper c2☆339Updated 2 years ago
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆151Updated 4 years ago
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆183Updated 2 years ago
- The Definitive Guide To Process Cloning on Windows☆505Updated last year
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆270Updated last year
- For when DLLMain is the only way☆386Updated 8 months ago
- ROP-based sleep obfuscation to evade memory scanners☆357Updated last week
- DLL sideloading/proxying with Nim!☆171Updated 2 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆219Updated 2 years ago
- ☆46Updated 4 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆229Updated 6 months ago
- Evasion by machine code de-optimization.☆386Updated 11 months ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆482Updated 2 years ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆376Updated last year
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆289Updated this week
- Load Windows DLL from memory☆132Updated 2 years ago
- Windows shellcode development in Rust☆290Updated 4 years ago
- Using fibers to run in-memory code.☆210Updated last year