gmh5225 / rust-mordor-rsLinks
Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library
☆32Updated 3 years ago
Alternatives and similar repositories for rust-mordor-rs
Users that are interested in rust-mordor-rs are comparing it to the libraries listed below
Sorting:
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆84Updated 6 months ago
- ☆100Updated 2 years ago
- A reflective DLL development template for the Rust programming language☆109Updated last week
- Linker for Beacon Object Files☆129Updated 2 weeks ago
- A COFF Loader written in Rust☆131Updated last week
- ☆84Updated 9 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆159Updated 6 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆87Updated 2 years ago
- ☆62Updated last year
- ☆126Updated last year
- TypeLib persistence technique☆136Updated last year
- remote process injections using pool party techniques☆67Updated 4 months ago
- ForsHops☆59Updated 7 months ago
- load shellcode without P/D Invoke and VirtualProtect call.☆160Updated 2 months ago
- shell code example☆63Updated 2 weeks ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆157Updated last year
- Shellcode loader that executes embedded Lua from Rust.☆125Updated 11 months ago
- An example reference design for a proposed BOF PE☆187Updated 6 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆102Updated 8 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆98Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆134Updated last year
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆91Updated 3 weeks ago
- A BOF to enumerate system process, their protection levels, and more.☆123Updated 11 months ago
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆219Updated last month
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆134Updated 8 months ago
- Template-based generation of shellcode loaders☆79Updated last year
- A process injection technique using only thread context manipulation☆39Updated last year
- An App Domain Manager Injection DLL PoC on steroids☆203Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆129Updated 2 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Updated 8 months ago