killvxk / Rust-for-Malware-Development-Whitecat18Links
This repository contains my complete resources and coding practices for malware development using Rust π¦.
β16Updated last year
Alternatives and similar repositories for Rust-for-Malware-Development-Whitecat18
Users that are interested in Rust-for-Malware-Development-Whitecat18 are comparing it to the libraries listed below
Sorting:
- A simple Sleepmask BOF exampleβ167Updated 2 months ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dllβDllMain is Cobalt Strike UDRL-compatibleβ264Updated 7 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.β280Updated 10 months ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...β169Updated last year
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Schedulerβ135Updated 6 months ago
- UAC Bypass using UIAccess program QuickAssistβ208Updated 2 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR β¦β296Updated last year
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) β weaponized to kill protected EDR/AV processes via BYOVD.β180Updated 4 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection technβ¦β196Updated 7 months ago
- BOF to run PE in Cobalt Strike Beacon without console creationβ184Updated 2 months ago
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.β225Updated 4 months ago
- A reflective DLL development template for the Rust programming languageβ112Updated 3 months ago
- find dll base addresses without PEB WALKβ157Updated 6 months ago
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls executionβ198Updated 8 months ago
- ApexLdr is a DLL Payload Loader written in Cβ116Updated last year
- A Rust port of LayeredSyscall β performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.β160Updated last year
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dllβ135Updated 9 months ago
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.β294Updated 3 months ago
- Generic PE loader for fast prototyping evasion techniquesβ244Updated last year
- An example reference design for a proposed BOF PEβ197Updated 2 weeks ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similarβ136Updated last year
- Dumping App Bound Protected Credentials & Cookies Without Privileges.β166Updated 8 months ago
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)β79Updated last year
- Bypass LSA protection using the BYODLL techniqueβ170Updated last year
- Sleep obfuscationβ264Updated last year
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, pβ¦β195Updated last month
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryptionβ190Updated last month
- NSecSoftBYOVD POCβ54Updated 4 months ago
- TypeLib persistence techniqueβ139Updated last year
- Injecting DLL into LSASS at bootβ156Updated 9 months ago