dronavallipranav / rust-obfuscator
Automatic Rust Obfuscator and Macro Library
☆171Updated 10 months ago
Alternatives and similar repositories for rust-obfuscator:
Users that are interested in rust-obfuscator are comparing it to the libraries listed below
- ☆111Updated last year
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆92Updated 6 months ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆244Updated last year
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆30Updated 7 months ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆331Updated 10 months ago
- Dynamically invoke arbitrary unmanaged code☆326Updated 2 months ago
- Rust For Windows Cheatsheet☆115Updated 3 months ago
- out-of-tree llvm obfuscation pass plugin (dynamically loadable by rustc). || rust toolchain with obfuscation llvm pass.☆102Updated 7 months ago
- A rust library that allows you to delete your executable while it's running.☆89Updated last year
- A Rust-based obfuscation macro library!☆170Updated 9 months ago
- x86-64 virtualizing obfuscator written in Rust☆71Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆207Updated last year
- Sanctum is a proof-of-concept EDR like tool, designed to detect modern malware techniques, above and beyond the capabilities of antivirus…☆22Updated this week
- Call stack spoofing for Rust☆309Updated 4 months ago
- The PE Executable Library, but for Rust!☆74Updated last year
- Host CLR and run .NET binaries using Rust☆82Updated this week
- Compiletime string literal obfuscation for Rust.☆490Updated 3 months ago
- A thin Rust wrapper around Windows' hardware breakpoints.☆20Updated 2 years ago
- Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)☆248Updated 5 months ago
- Inject a shellcode in a remote process using Process Hollowing.☆44Updated 3 years ago
- x86-64 code/pe virtualizer☆177Updated last month
- ☆46Updated last year
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆130Updated last year
- ROP-based sleep obfuscation to evade memory scanners☆326Updated 11 months ago
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆136Updated 4 years ago
- A Rust wrapper for the MinHook library☆27Updated 3 weeks ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆132Updated 3 months ago
- DLL proxying for lazy people☆148Updated last month
- Rust implementation of lazy_importer☆45Updated last year
- ☆137Updated last year