memN0ps / venom-rs
Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)
☆320Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for venom-rs
- Dynamically invoke arbitrary unmanaged code☆314Updated 3 weeks ago
- Threadless Process Injection through entry point hijacking☆333Updated last month
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆187Updated last year
- Call stack spoofing for Rust☆298Updated 2 months ago
- ROP-based sleep obfuscation to evade memory scanners☆321Updated 8 months ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆239Updated 11 months ago
- Using fibers to run in-memory code.☆193Updated last year
- Rust For Windows Cheatsheet☆110Updated last week
- Shellcode loader designed for evasion. Coded in Rust.☆107Updated last year
- A COFF loader made in Rust☆222Updated 3 weeks ago
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆237Updated 3 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆223Updated 4 months ago
- TartarusGate, Bypassing EDRs☆530Updated 2 years ago
- BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released a…☆367Updated 10 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆255Updated 9 months ago
- DLL proxying for lazy people☆135Updated last week
- ☆243Updated 9 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆296Updated 2 months ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆220Updated last year
- Exploitation of process killer drivers☆186Updated last year
- Reflective DLL Injection Made Bella☆197Updated 3 weeks ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆324Updated 5 months ago
- Apply a divide and conquer approach to bypass EDRs☆274Updated last year
- miscellaneous scripts and programs☆214Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆283Updated last year
- A BOF that runs unmanaged PEs inline☆544Updated 2 weeks ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆339Updated last year
- Process Injection using Thread Name☆239Updated 2 months ago