deadash / XP-CompatibleRustLinks
Introducing a powerful solution that converts any non-XP-compatible 32-bit exe or dll into a Windows XP-friendly binary. Our patch files are exceptionally small and easy to generate, making it incredibly straightforward to extend your software's support to the XP ecosystem.
☆24Updated last year
Alternatives and similar repositories for XP-CompatibleRust
Users that are interested in XP-CompatibleRust are comparing it to the libraries listed below
Sorting:
- DLL 转发工具方法。☆54Updated 2 years ago
- Simulate per-process disconnection in red team environments☆112Updated 6 months ago
- Python library to convert elf to os-independent shellcodes☆61Updated 2 years ago
- ☆13Updated 3 years ago
- ☆11Updated 2 years ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆63Updated 2 years ago
- Work with eBPF on Windows☆41Updated 9 months ago
- Rust编写的父进程PID欺骗技术测试工具☆53Updated 2 years ago
- AppX RPC Local Privilege Escalation - Windows 10/11☆90Updated last year
- Coffee is a loader for ELF (Executable and Linkable Format) object files written in Rust. Coffee是一个用Rust语言编写的ELF object文件的加载器☆63Updated last year
- A COFF Loader written in Rust☆133Updated 2 weeks ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Updated 3 years ago
- ☆21Updated last year
- Detect BypassUAC using AMSI☆29Updated 9 months ago
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆63Updated 9 months ago
- shellcode生成框架☆88Updated last year
- Load a statically-linked ELF binary(x86 architecture) without the execve syscall.☆45Updated 5 years ago
- Dll hijack -- just one macro☆12Updated 2 years ago
- Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode☆105Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- A swiss army knife tool for running, injecting and organizing your BOFs collection☆68Updated 5 months ago
- 该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。☆40Updated last year
- SU for Windows☆26Updated 3 years ago
- Hide Port In Windows☆42Updated last year
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆21Updated last year
- Windows Server 2003 Source☆22Updated 3 years ago
- An implementation of an indirect system call☆131Updated 2 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆37Updated 5 months ago
- A packer which adds encrypted shell to protect your PE file☆26Updated last year
- 使用kcp实现的socks5正向代理☆12Updated 2 years ago