kmanc / remote_code_oxidationLinks
☆114Updated 2 months ago
Alternatives and similar repositories for remote_code_oxidation
Users that are interested in remote_code_oxidation are comparing it to the libraries listed below
Sorting:
- ☆295Updated last year
- Apply a divide and conquer approach to bypass EDRs☆280Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆65Updated 2 years ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆272Updated last year
- Rust For Windows Cheatsheet☆121Updated 9 months ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆294Updated last month
- A rust library that allows you to delete your executable while it's running.☆89Updated 2 years ago
- Some Rust program I wrote while learning Malware Development☆137Updated 6 months ago
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆98Updated last month
- Venom is a library that meant to perform evasive communication using stolen browser socket☆386Updated last year
- Using fibers to run in-memory code.☆216Updated last year
- Threadless Process Injection through entry point hijacking☆347Updated 10 months ago
- Windows shellcode development in Rust☆299Updated 4 years ago
- ☆300Updated 9 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆188Updated 10 months ago
- ☆133Updated last year
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆339Updated last year
- Linux Enumeration / Privilege escalation tool☆24Updated 4 years ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆231Updated 4 months ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆232Updated 7 months ago
- RedLizard Rust TCP Reverse Shell Server/Client☆137Updated last year
- Rusty Impersonate☆99Updated 2 years ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆197Updated 4 months ago
- ☆133Updated 2 years ago
- Dynamically invoke arbitrary unmanaged code☆348Updated 8 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆229Updated 7 months ago
- A prototype malware C2 channel using x509 certificates over mTLS☆153Updated last year
- Tools for analyzing EDR agents☆238Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆143Updated 11 months ago