ebalo55 / awesome-offensive-rust
Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.
☆68Updated this week
Related projects ⓘ
Alternatives and complementary repositories for awesome-offensive-rust
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆225Updated 4 months ago
- Payload encoding utility to effectively lower payload entropy.☆99Updated this week
- Nameless C2 - A C2 with all its components written in Rust☆242Updated last month
- Some Rust program I wrote while learning Malware Development☆113Updated 4 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆77Updated last month
- Using fibers to run in-memory code.☆194Updated last year
- Rust For Windows Cheatsheet☆110Updated 3 weeks ago
- Rust port of LayeredSyscall, designed to perform indirect syscalls while generating legitimate API call stack frames by abusing Vectored …☆101Updated 3 weeks ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆158Updated 3 weeks ago
- Local & remote Windows DLL Proxying☆161Updated 5 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆171Updated 10 months ago
- Shellcode loader designed for evasion. Coded in Rust.☆107Updated last year
- DLL proxying for lazy people☆136Updated 2 weeks ago
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆64Updated 2 years ago
- A set of programs for analyzing common vulnerabilities in COM☆154Updated 2 months ago
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls☆104Updated 2 months ago
- Template-based generation of shellcode loaders☆67Updated 7 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆146Updated 3 weeks ago
- Apply a divide and conquer approach to bypass EDRs☆275Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆209Updated 2 months ago
- Early Bird APC Injection in Rust☆50Updated last month
- Command and Control (C2) framework☆121Updated 7 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆240Updated 5 months ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆237Updated 3 months ago
- Tools for analyzing EDR agents☆209Updated 5 months ago
- Detect EDR's exceptions by inspecting processes' loaded modules☆121Updated 8 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆63Updated 2 months ago
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆138Updated 8 months ago
- Reflective DLL Injection Made Bella☆200Updated last month
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆226Updated last month