memN0ps / eagle-rsView external linksLinks
Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)
☆575Jun 5, 2023Updated 2 years ago
Alternatives and similar repositories for eagle-rs
Users that are interested in eagle-rs are comparing it to the libraries listed below
Sorting:
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆360Mar 2, 2024Updated last year
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆562Sep 12, 2023Updated 2 years ago
- Rusty Hypervisor - Windows Kernel Blue Pill Type-2 Hypervisor in Rust (Codename: Matrix)☆316Jul 7, 2024Updated last year
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆230Mar 23, 2023Updated 2 years ago
- Call stack spoofing for Rust☆356Feb 7, 2025Updated last year
- Rust Weaponization for Red Team Engagements.☆2,982Apr 25, 2024Updated last year
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆282Feb 8, 2024Updated 2 years ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,202Feb 1, 2026Updated last week
- Dynamically invoke arbitrary unmanaged code☆358Nov 20, 2024Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆1,004Jun 4, 2024Updated last year
- KaynLdr is a Reflective Loader written in C/ASM☆555Dec 3, 2023Updated 2 years ago
- Sleep Obfuscation☆814Dec 3, 2023Updated 2 years ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆587Aug 2, 2025Updated 6 months ago
- Examples on how to write Windows kernel drivers in Rust☆245Apr 23, 2024Updated last year
- Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)☆338Aug 31, 2024Updated last year
- A modern 32/64-bit position independent implant template☆1,294Mar 21, 2025Updated 10 months ago
- UAC bypass by abusing RPC and debug objects.☆629Oct 19, 2023Updated 2 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆933Mar 29, 2022Updated 3 years ago
- PoCs and tools for investigation of Windows process execution techniques☆953Feb 2, 2026Updated last week
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆671Nov 9, 2023Updated 2 years ago
- Windows shellcode development in Rust☆305Feb 6, 2021Updated 5 years ago
- ☆1,781Aug 30, 2024Updated last year
- Windows Kernel Rootkit in Rust☆679Oct 10, 2025Updated 4 months ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,585Jul 31, 2024Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,398Nov 22, 2023Updated 2 years ago
- ☆504Aug 14, 2022Updated 3 years ago
- x64 binary obfuscator☆1,958Jul 14, 2023Updated 2 years ago
- Reuse open handles to dynamically dump LSASS.☆246Apr 4, 2024Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆722Aug 18, 2023Updated 2 years ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆317Jun 24, 2025Updated 7 months ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- A cross platform C2/post-exploitation framework.☆706Oct 8, 2022Updated 3 years ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆235Mar 12, 2025Updated 11 months ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆549Apr 8, 2025Updated 10 months ago
- Now You See Me, Now You Don't☆1,025Jan 23, 2026Updated 3 weeks ago
- A COFF loader made in Rust☆327Aug 20, 2025Updated 5 months ago
- Shellcode injection technique. Given as C++ header, standalone Rust program or library.☆706Sep 26, 2023Updated 2 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆901Jul 20, 2024Updated last year
- ☆152Jan 6, 2023Updated 3 years ago