epi052 / rustdsplit
At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypass signature-based AV. The tool I used back then is gone, so I wrote this.
☆35Updated 4 years ago
Alternatives and similar repositories for rustdsplit:
Users that are interested in rustdsplit are comparing it to the libraries listed below
- MiniDump a process in memory with rust☆36Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- ☆55Updated 3 years ago
- pypykatz plugin for volatility3 framework☆39Updated 9 months ago
- Python 3 server used to control SK8RAT implant☆35Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- AMSI detection PoC☆30Updated 4 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Visual Studio (C++) Solution Template for Payloads☆18Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆74Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 3 years ago
- Walking the PEB in VBA☆22Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆45Updated 4 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆17Updated 2 years ago
- ☆16Updated 4 years ago
- In 'n Out - See what goes in and comes out of PEs☆33Updated 2 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆59Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆31Updated 2 years ago
- An async Python client library for Empire's RESTful API☆25Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago