ebalo55 / awesome-offensive-rust
Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.
☆91Updated 4 months ago
Alternatives and similar repositories for awesome-offensive-rust:
Users that are interested in awesome-offensive-rust are comparing it to the libraries listed below
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆242Updated 9 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆225Updated 3 months ago
- Nameless C2 - A C2 with all its components written in Rust☆266Updated 7 months ago
- Some Rust program I wrote while learning Malware Development☆131Updated 2 months ago
- A dirty PoC for a reverse shell with cool features in Rust☆182Updated 7 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆177Updated 2 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆123Updated 6 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆187Updated 4 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆161Updated 4 months ago
- Using fibers to run in-memory code.☆206Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆77Updated this week
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆205Updated 2 months ago
- Call Stack Spoofing for Rust with support #[no_std]☆83Updated this week
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆181Updated 7 months ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆153Updated last year
- Port of Cobalt Strike's Process Inject Kit☆173Updated 4 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆142Updated 5 months ago
- kernel callback removal (Bypassing EDR Detections)☆161Updated last month
- A Mythic Agent written in PIC C.☆186Updated 2 months ago
- Stage 0☆156Updated 4 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆261Updated 7 months ago
- Open Source C&C Specification☆243Updated last month
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆198Updated 10 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆257Updated 10 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆185Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆228Updated last month
- Reaping treasures from strings in remote processes memory☆252Updated 2 months ago
- ☆248Updated 2 years ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆104Updated 4 months ago
- ☆153Updated 8 months ago