joaoviictorti / shadow-rs
Windows Kernel Rootkit in Rust
☆594Updated 2 weeks ago
Alternatives and similar repositories for shadow-rs:
Users that are interested in shadow-rs are comparing it to the libraries listed below
- Centralized resource for listing and organizing known injection techniques and POCs☆475Updated 2 weeks ago
- Complete list of LPE exploits for Windows (starting from 2023)☆781Updated 2 weeks ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆536Updated this week
- Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)☆551Updated last year
- Because AV evasion should be easy.☆716Updated 5 months ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆259Updated last year
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆275Updated last week
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆528Updated last year
- Evasive shellcode loader☆361Updated 6 months ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆337Updated last year
- A command and control framework written in rust.☆343Updated 2 months ago
- Real fucking shellcode encryptor & obfuscator tool☆853Updated 2 weeks ago
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust 🦀☆1,588Updated last week
- ROP-based sleep obfuscation to evade memory scanners☆349Updated 2 months ago
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆368Updated 7 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆381Updated 7 months ago
- Evasion by machine code de-optimization.☆376Updated 9 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆301Updated 3 months ago
- ☆241Updated 3 months ago
- Performing Indirect Clean Syscalls☆541Updated 2 years ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆294Updated 2 weeks ago
- Analyse your malware to surgically obfuscate it☆465Updated 2 months ago
- Dynamically invoke arbitrary unmanaged code☆341Updated 5 months ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆297Updated 7 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆307Updated 7 months ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆274Updated last month
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,242Updated this week
- COM ViewLogger — new malware keylogging technique☆357Updated 4 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆675Updated last month
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆717Updated last year