gmiam / rust-musl-actionView external linksLinks
GitHub Action for Rust and MUSL
☆15Dec 17, 2022Updated 3 years ago
Alternatives and similar repositories for rust-musl-action
Users that are interested in rust-musl-action are comparing it to the libraries listed below
Sorting:
- A Rust abstraction over ConPTY https://devblogs.microsoft.com/commandline/windows-command-line-introducing-the-windows-pseudo-console-con…☆22Sep 23, 2024Updated last year
- Rust bindings for VMProtect.☆27Mar 8, 2024Updated last year
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- Playing with LLVM passes☆40Aug 17, 2023Updated 2 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 7 months ago
- Windows Desktop duplication API for rust☆40Jan 26, 2026Updated 2 weeks ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆16Nov 18, 2025Updated 2 months ago
- Totally not inspired by crackmapexec. It's a learning project and aims to expose modules useful for AD tools☆13Nov 7, 2024Updated last year
- Shell-Craft harnesses the potential of OpenAI's API to execute prompts, generate shell commands, and auto-fill templates seamlessly inte…☆12Nov 10, 2023Updated 2 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 9 months ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 6 years ago
- KCP bindings for Rust☆10Feb 1, 2022Updated 4 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 2 years ago
- Update Indicator for Fedora and Gnome-Shell☆10May 15, 2022Updated 3 years ago
- 🛠️ Explore custom C2 TTPs with Aether-C2-Framework, focusing on lightweight Rust implants and stealthy transport stacks to reduce forens…☆18Updated this week
- ☆11Jul 12, 2022Updated 3 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- My CS2 Sdk I use in my private project with vphys/tri parsing & checking☆11Oct 13, 2024Updated last year
- Translating WebAssembly into the most simple LLVM IR.☆14Jan 6, 2026Updated last month
- String formatting in Rust without memory allocator☆17Dec 2, 2024Updated last year
- 👾 A command-line tool to easily run a man-in-the-middle attack leveraging ARP cache poisoning.☆13Sep 15, 2024Updated last year
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 8 months ago
- Use winsqlite3.dll (the SQLite DLL that ships with Windows 10) in PowerShell☆12Jan 12, 2025Updated last year
- Firefox with steroids☆15Jun 15, 2025Updated 8 months ago
- O Projeto FR1DA Web é uma aplicação interativa para administrar dispositivos Android via ADB e executar scripts Frida. Oferece funcionali…☆13Nov 20, 2024Updated last year
- malloc for memory-mapped files☆14Jun 25, 2020Updated 5 years ago
- Nix files for installing Yandex Browser on NixOS☆12Updated this week
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆16Feb 13, 2024Updated 2 years ago
- Installer preseed configurations for Kali Linux☆15Oct 20, 2021Updated 4 years ago
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 8 months ago
- Port of OpenAI's Whisper model in C/C++☆11Aug 17, 2024Updated last year
- An example of how using runit in Docker containers.☆13Aug 15, 2024Updated last year
- A SQLite extension for extracting values from serialized protobuf messages without the need for the protobuf definition (.proto file)☆17Oct 21, 2025Updated 3 months ago
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated last year
- ☆12Sep 13, 2023Updated 2 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year