joaoviictorti / dinvkView external linksLinks
Dynamically invoke arbitrary code in Rust (Dinvoke)
☆101Dec 1, 2025Updated 2 months ago
Alternatives and similar repositories for dinvk
Users that are interested in dinvk are comparing it to the libraries listed below
Sorting:
- Rust template/library for implementing your own COFF loader☆71Jan 27, 2025Updated last year
- 64-bit, position-independent implant template for Windows in Rust.☆172Nov 28, 2025Updated 2 months ago
- Host CLR and run .NET binaries using Rust☆149Dec 23, 2025Updated last month
- Rust crate to parse user-mode minidump files generated on Windows☆18Nov 17, 2025Updated 3 months ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated 11 months ago
- A reflective DLL development template for the Rust programming language☆113Nov 4, 2025Updated 3 months ago
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆63Mar 1, 2025Updated 11 months ago
- find dll base addresses without PEB WALK☆157Jul 13, 2025Updated 7 months ago
- Call Stack Spoofing for Rust☆210Jan 28, 2026Updated 2 weeks ago
- Activation Context Hijack☆169Aug 3, 2025Updated 6 months ago
- A COFF Loader written in Rust☆135Dec 1, 2025Updated 2 months ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated 10 months ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆230Mar 23, 2023Updated 2 years ago
- x86-64 virtualizing obfuscator written in Rust☆78Nov 16, 2023Updated 2 years ago
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆136Aug 31, 2025Updated 5 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆161Oct 31, 2024Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆231Feb 12, 2025Updated last year
- An i686 & x86_64 position independent implant template for Rust 🦀☆33Jul 6, 2025Updated 7 months ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆74Aug 19, 2025Updated 5 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Sep 18, 2024Updated last year
- Dynamically invoke arbitrary unmanaged code☆358Nov 20, 2024Updated last year
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆262Aug 31, 2025Updated 5 months ago
- Rust implementation of lazy_importer☆59Aug 3, 2023Updated 2 years ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆139Oct 20, 2025Updated 3 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆66Feb 11, 2025Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆235Mar 12, 2025Updated 11 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆50Jun 1, 2025Updated 8 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆116Jan 20, 2025Updated last year
- A few examples of how to trap virtual memory access on Windows.☆40Dec 18, 2024Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆337Jun 23, 2025Updated 7 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆183Jan 17, 2026Updated 3 weeks ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆358Aug 11, 2024Updated last year
- ☆55May 31, 2025Updated 8 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated 11 months ago