ebalo55 / awesome-offensive-rustView external linksLinks
Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.
☆114Jun 12, 2025Updated 8 months ago
Alternatives and similar repositories for awesome-offensive-rust
Users that are interested in awesome-offensive-rust are comparing it to the libraries listed below
Sorting:
- 64-bit, position-independent implant template for Windows in Rust.☆172Nov 28, 2025Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆85Apr 26, 2025Updated 9 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆161Oct 31, 2024Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated 11 months ago
- A COFF Loader written in Rust☆135Dec 1, 2025Updated 2 months ago
- Rust template/library for implementing your own COFF loader☆71Jan 27, 2025Updated last year
- A reflective DLL development template for the Rust programming language☆113Nov 4, 2025Updated 3 months ago
- UAC Bypass using CMSTP in Rust☆34Dec 6, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Host CLR and run .NET binaries using Rust☆149Dec 23, 2025Updated last month
- A Rust crate to parse user-mode minidump files generated on Windows☆18Nov 17, 2025Updated 2 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆231Feb 12, 2025Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆30Feb 7, 2025Updated last year
- Dynamically invoke arbitrary unmanaged code☆358Nov 20, 2024Updated last year
- windows-rs shellcode loaders☆392Jul 11, 2024Updated last year
- An i686 & x86_64 position independent implant template for Rust 🦀☆33Jul 6, 2025Updated 7 months ago
- Tools for analyzing EDR agents☆277Jun 10, 2024Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated 10 months ago
- CobaltStrike beacon in rust☆208Aug 10, 2024Updated last year
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆317Jun 24, 2025Updated 7 months ago
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆42Jan 9, 2025Updated last year
- Call Stack Spoofing for Rust☆209Jan 28, 2026Updated 2 weeks ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Some Rust program I wrote while learning Malware Development☆160Feb 4, 2025Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆230Mar 23, 2023Updated 2 years ago
- A COFF loader made in Rust☆327Aug 20, 2025Updated 5 months ago
- Call stack spoofing for Rust☆356Feb 7, 2025Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- BOF to decrypt Signal Desktop chat logs☆72Feb 20, 2025Updated 11 months ago
- Dynamically invoke arbitrary code in Rust (Dinvoke)☆101Dec 1, 2025Updated 2 months ago
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 2 years ago
- Inject a shellcode in a remote process using Process Hollowing.☆54Sep 18, 2021Updated 4 years ago
- DLL proxying for lazy people☆198Dec 1, 2025Updated 2 months ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆50Jun 1, 2025Updated 8 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆33Sep 21, 2024Updated last year
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆381Apr 26, 2025Updated 9 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆339Oct 7, 2024Updated last year