novafacing / cargo-shellcodeLinks
Cargo subcommand to build a crate into shellcode
☆24Updated last year
Alternatives and similar repositories for cargo-shellcode
Users that are interested in cargo-shellcode are comparing it to the libraries listed below
Sorting:
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆47Updated 5 months ago
- Sample Rust crate used to implement a VBS enclave in Rust☆36Updated 5 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆42Updated last year
- Rust bindings for VMProtect.☆26Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆132Updated 3 weeks ago
- x86-64 virtualizing obfuscator written in Rust☆76Updated last year
- Safe Rust bindings for the COM interfaces of the Windows debugging engine☆15Updated last week
- LLVM based obfuscation engine☆106Updated 4 months ago
- Rust library for lifting raw binary data to LLVM IR☆60Updated 3 months ago
- Minimalistic Windows Kernel Allocator.☆49Updated last year
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated 10 months ago
- Rust implementation of lazy_importer☆57Updated 2 years ago
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆40Updated 3 weeks ago
- Structured Exception Handling (SEH) for Rust☆66Updated last year
- IDA plugin to recover source code from panic information on rust☆17Updated 6 months ago
- PDB Rewriting Rust Library☆25Updated last year
- A thin Rust wrapper around Windows' hardware breakpoints.☆21Updated 3 years ago
- Report and exploit of CVE-2024-21305.☆38Updated last year
- Fork of LLVM for LTO pass plugins support.☆20Updated 4 months ago
- Dynamically invoke arbitrary code in Rust (Dinvoke)☆94Updated last week
- ntoskrnl.exe and bootmgfw.efi obfuscated with CodeDefender☆49Updated 3 weeks ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated 3 months ago
- dynamic binary instrumentation, analysis, and patching framework☆95Updated last month
- A few examples of how to trap virtual memory access on Windows.☆35Updated 10 months ago
- ☆95Updated last year
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆120Updated last week
- Research-focused hypervisor offering advanced tools for debugging, virtual machine introspection, and automation.☆41Updated last week
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25Updated 6 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- Modular and extensible library for Virtual Machine Introspection☆111Updated 2 months ago