This repository contains my complete resources and coding practices for malware development using Rust 🦀.
☆16Jan 15, 2025Updated last year
Alternatives and similar repositories for Rust-for-Malware-Development-Whitecat18
Users that are interested in Rust-for-Malware-Development-Whitecat18 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script will not work with the latest version of chrome☆13May 11, 2025Updated 10 months ago
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆18Sep 9, 2025Updated 6 months ago
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆43Jan 15, 2026Updated 2 months ago
- Open Source XSS exploitation tool. using http proxy to access the browser which executed js. [Engineering Experimental]☆36Nov 22, 2024Updated last year
- C2☆123Dec 29, 2025Updated 2 months ago
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆27Mar 31, 2025Updated 11 months ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆12Jun 3, 2025Updated 9 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆38Sep 22, 2024Updated last year
- List of tools to use in the Advance Red Team Operations course from White Knight Labs☆14Dec 22, 2024Updated last year
- ☆18Mar 22, 2025Updated last year
- ☆121Nov 21, 2024Updated last year
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 8 months ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- ☆18Aug 8, 2024Updated last year
- ☆24Dec 31, 2025Updated 2 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated last year
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆21Apr 2, 2025Updated 11 months ago
- Rizin Signature Database (Source)☆17Aug 23, 2023Updated 2 years ago
- out-of-tree llvm obfuscation pass plugin (dynamically loadable by rustc). || rust toolchain with obfuscation llvm pass.☆182Jun 28, 2024Updated last year
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 9 months ago
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 9 months ago
- An experimental modular OS written in Rust.☆12Jul 19, 2024Updated last year
- various methods of making API calls☆19Feb 1, 2025Updated last year
- 第四届 “网鼎杯” 网络安全大赛 白虎组 初赛☆16Nov 1, 2024Updated last year
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 3 years ago
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- PoC Bypass Chrome Cookies App-Bound Encryption v20☆11Apr 9, 2025Updated 11 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- ☆10Jan 21, 2026Updated 2 months ago
- ☆81Feb 12, 2026Updated last month
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- ☆18Aug 15, 2025Updated 7 months ago
- 向pyc中插入python代码或shellcode☆20Mar 25, 2024Updated last year
- Archive of leaked Equation Group materials☆22Aug 17, 2016Updated 9 years ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆200Dec 30, 2025Updated 2 months ago