joaoviictorti / shadow-rs
Windows Kernel Rootkit in Rust
☆374Updated last month
Alternatives and similar repositories for shadow-rs:
Users that are interested in shadow-rs are comparing it to the libraries listed below
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆244Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆510Updated 9 months ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆522Updated last year
- Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)☆541Updated last year
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆329Updated 10 months ago
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆355Updated 3 months ago
- Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys☆437Updated last year
- Performing Indirect Clean Syscalls☆506Updated last year
- COM ViewLogger — new malware keylogging technique☆292Updated 2 weeks ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆312Updated 3 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆260Updated 7 months ago
- ☆166Updated last week
- Some POCs for my BYOVD research and find some vulnerable drivers☆154Updated 4 months ago
- Dynamically invoke arbitrary unmanaged code☆327Updated last month
- Complete list of LPE exploits for Windows (starting from 2023)☆695Updated this week
- Threadless Process Injection through entry point hijacking☆340Updated 4 months ago
- ROP-based sleep obfuscation to evade memory scanners☆326Updated 10 months ago
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆288Updated 9 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆284Updated 3 months ago
- Shellcode loader generator with multiples features☆437Updated 2 weeks ago
- ☆247Updated 5 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆613Updated 3 months ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆364Updated 11 months ago
- Call stack spoofing for Rust☆307Updated 4 months ago
- Using fibers to run in-memory code.☆199Updated last year
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆262Updated 5 months ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆206Updated last year
- Evasive shellcode loader☆315Updated 3 months ago
- Now You See Me, Now You Don't☆893Updated 2 weeks ago
- Because AV evasion should be easy.☆602Updated last month