joaoviictorti / shadow-rsLinks
Windows Kernel Rootkit in Rust
☆630Updated last month
Alternatives and similar repositories for shadow-rs
Users that are interested in shadow-rs are comparing it to the libraries listed below
Sorting:
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆335Updated last month
- Centralized resource for listing and organizing known injection techniques and POCs☆594Updated 2 weeks ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆546Updated this week
- Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)☆561Updated 2 years ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆540Updated last year
- Because AV evasion should be easy.☆778Updated 8 months ago
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆374Updated 9 months ago
- Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antiv…☆266Updated this week
- Evasion by machine code de-optimization.☆394Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆816Updated 3 weeks ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆272Updated last year
- ☆14Updated 6 months ago
- Shoggoth: Asmjit Based Polymorphic Encryptor☆742Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆926Updated last month
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,144Updated last year
- ROP-based sleep obfuscation to evade memory scanners☆360Updated last month
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆294Updated last month
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆707Updated 4 months ago
- Now You See Me, Now You Don't☆959Updated 7 months ago
- Evasive shellcode loader☆378Updated 9 months ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆675Updated 9 months ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆324Updated 2 months ago
- PoCs for Kernelmode rootkit techniques research.☆378Updated 6 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆562Updated last year
- Dynamically invoke arbitrary unmanaged code☆348Updated 8 months ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆339Updated last year
- Performing Indirect Clean Syscalls☆572Updated 2 years ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆319Updated 9 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆719Updated last year
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust 🦀☆1,679Updated 3 weeks ago