memN0ps / venom-rs
Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)
☆337Updated last year
Alternatives and similar repositories for venom-rs:
Users that are interested in venom-rs are comparing it to the libraries listed below
- Dynamically invoke arbitrary unmanaged code☆341Updated 5 months ago
- Call stack spoofing for Rust☆333Updated 3 months ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆212Updated 2 years ago
- ROP-based sleep obfuscation to evade memory scanners☆349Updated 2 months ago
- Threadless Process Injection through entry point hijacking☆344Updated 7 months ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆259Updated last year
- Rust For Windows Cheatsheet☆119Updated 6 months ago
- Using fibers to run in-memory code.☆206Updated last year
- Shellcode loader designed for evasion. Coded in Rust.☆129Updated 2 years ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆285Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆243Updated 10 months ago
- Reuse open handles to dynamically dump LSASS.☆243Updated last year
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆274Updated last month
- DLL proxying for lazy people☆158Updated 5 months ago
- Process Injection using Thread Name☆259Updated 3 weeks ago
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆263Updated last year
- BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released a…☆380Updated last year
- Some Rust program I wrote while learning Malware Development☆132Updated 3 months ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆228Updated last year
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆252Updated 9 months ago
- Some POCs for my BYOVD research and find some vulnerable drivers☆206Updated last month
- A COFF loader made in Rust☆296Updated 6 months ago
- WTSRM☆210Updated 2 years ago
- ☆256Updated last year
- Exploitation of process killer drivers☆200Updated last year
- A BOF that runs unmanaged PEs inline☆596Updated 6 months ago
- TartarusGate, Bypassing EDRs☆580Updated 3 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆338Updated 2 months ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆490Updated last year
- Apply a divide and conquer approach to bypass EDRs☆280Updated last year