darkr4y / OffensiveZig
Some attempts at using Zig(https://ziglang.org/) in penetration testing.
☆233Updated 8 months ago
Alternatives and similar repositories for OffensiveZig:
Users that are interested in OffensiveZig are comparing it to the libraries listed below
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆259Updated 2 months ago
- Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications☆188Updated this week
- Nim Library for Offensive Security Development☆197Updated last year
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆142Updated 4 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆229Updated last year
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆181Updated 2 years ago
- Dynamically invoke arbitrary unmanaged code☆338Updated 4 months ago
- Very basic dll injector written in zig, for windows. Assumes the injector, target process, and dll are of the same bitness. Usage: ./inje…☆28Updated 4 years ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆334Updated last year
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆167Updated 3 years ago
- The Definitive Guide To Process Cloning on Windows☆465Updated last year
- grim reaper c2☆335Updated 2 years ago
- Call stack spoofing for Rust☆328Updated last month
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆226Updated 3 months ago
- DLL sideloading/proxying with Nim!☆166Updated 2 years ago
- Threadless Process Injection through entry point hijacking☆343Updated 6 months ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆267Updated 8 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆276Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆209Updated 2 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆241Updated 9 months ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆213Updated 3 weeks ago
- Using fibers to run in-memory code.☆205Updated last year
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆248Updated last year
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆240Updated last year
- Apply a divide and conquer approach to bypass EDRs☆278Updated last year
- ROP-based sleep obfuscation to evade memory scanners☆343Updated last month
- miscellaneous scripts and programs☆237Updated 2 months ago
- A Nim implementation of reflective PE-Loading from memory☆275Updated 6 months ago
- Windows shellcode development in Rust☆288Updated 4 years ago
- Automated compiler obfuscation for nim☆138Updated 2 years ago