joaoviictorti / dbg-rsLinks
Safe Rust bindings for the COM interfaces of the Windows debugging engine
☆15Updated last week
Alternatives and similar repositories for dbg-rs
Users that are interested in dbg-rs are comparing it to the libraries listed below
Sorting:
- A synergized Visual Studio and Rust development environment☆19Updated 9 months ago
- A Rust crate to parse user-mode minidump files generated on Windows☆17Updated last week
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated 11 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Updated 3 years ago
- Reflective DLL self-loading as a library☆21Updated 6 months ago
- Payload Obfuscation for Red Teams workshop materials☆75Updated 3 weeks ago
- Generate Proxy DLLs in Rust☆45Updated 2 months ago
- ☆22Updated 2 years ago
- A rust based DLL injection project☆30Updated 3 years ago
- Rust template/library for implementing your own COFF loader☆72Updated 9 months ago
- ☆51Updated 3 weeks ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆35Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆92Updated 4 months ago
- ☆51Updated 7 months ago
- A few examples of how to trap virtual memory access on Windows.☆35Updated 10 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆42Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Updated 9 months ago
- A different approach to writing BOFs in rust.☆17Updated 2 months ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆47Updated 5 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- various methods of making API calls☆19Updated 9 months ago
- The Proof of concept for abusing SeDebugPrivilege (Privilege Escalation in Windows)☆17Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆23Updated 7 months ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆68Updated this week
- ☆51Updated 3 months ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Updated 7 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆122Updated this week
- Rust implementation of lazy_importer☆57Updated 2 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆38Updated 2 months ago
- ☆20Updated 8 months ago