joaoviictorti / shadow-rs
Windows Kernel Rootkit in Rust
☆304Updated last week
Related projects ⓘ
Alternatives and complementary repositories for shadow-rs
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆321Updated 8 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆244Updated 5 months ago
- ROP-based sleep obfuscation to evade memory scanners☆323Updated 8 months ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆240Updated last year
- Threadless Process Injection through entry point hijacking☆334Updated 2 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆494Updated 7 months ago
- Dynamically invoke arbitrary unmanaged code☆316Updated last month
- Some POCs for my BYOVD research and find some vulnerable drivers☆126Updated 2 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆325Updated 5 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆171Updated 3 weeks ago
- Performing Indirect Clean Syscalls☆483Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆225Updated 4 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆304Updated 3 months ago
- Reflective DLL Injection Made Bella☆200Updated last month
- PoCs for Kernelmode rootkit techniques research.☆334Updated last week
- ☆245Updated 10 months ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆341Updated 9 months ago
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆283Updated 7 months ago
- ☆236Updated 3 months ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆344Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆260Updated 10 months ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆237Updated 3 months ago
- Call stack spoofing for Rust☆299Updated 2 months ago
- LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It …☆268Updated last month
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆353Updated last month
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆194Updated 3 months ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆189Updated last year
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆383Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆353Updated last week
- Shoggoth: Asmjit Based Polymorphic Encryptor☆679Updated 7 months ago