kmanc / remote_code_oxidationLinks
☆114Updated 6 months ago
Alternatives and similar repositories for remote_code_oxidation
Users that are interested in remote_code_oxidation are comparing it to the libraries listed below
Sorting:
- Apply a divide and conquer approach to bypass EDRs☆287Updated 2 years ago
- ☆297Updated last year
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆64Updated 3 years ago
- Rust For Windows Cheatsheet☆121Updated last year
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆307Updated 4 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆394Updated 2 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- Threadless Process Injection through entry point hijacking☆347Updated last year
- A rust library that allows you to delete your executable while it's running.☆90Updated 2 years ago
- Using fibers to run in-memory code.☆220Updated 2 years ago
- ☆133Updated 2 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆232Updated 11 months ago
- A prototype malware C2 channel using x509 certificates over mTLS☆151Updated last year
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆103Updated 5 months ago
- RedLizard Rust TCP Reverse Shell Server/Client☆137Updated last year
- Windows shellcode development in Rust☆306Updated 4 years ago
- Poseidon is a Golang agent targeting Linux and macOS☆183Updated 2 weeks ago
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆396Updated 2 months ago
- Dynamically invoke arbitrary unmanaged code☆354Updated last year
- Linux Enumeration / Privilege escalation tool☆26Updated 5 years ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆351Updated last year
- ☆105Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆95Updated 3 years ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆194Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆201Updated 7 months ago
- Some Rust program I wrote while learning Malware Development☆155Updated 9 months ago
- ☆132Updated 2 years ago
- Rusty Impersonate☆102Updated last month
- A Python gRPC Client Library for Sliver☆77Updated 7 months ago
- Detect EDR's exceptions by inspecting processes' loaded modules☆130Updated last year