Curated list of awesome projects and resources related to Rust and computer security
☆577Feb 22, 2024Updated 2 years ago
Alternatives and similar repositories for awesome-rust-security
Users that are interested in awesome-rust-security are comparing it to the libraries listed below
Sorting:
- Applied offensive security with Rust - https://kerkour.com/black-hat-rust☆4,281Oct 1, 2025Updated 5 months ago
- Rust Weaponization for Red Team Engagements.☆2,988Apr 25, 2024Updated last year
- A curated list of Cosmos ecosystem links, focusing on the security aspect of it☆74Dec 11, 2025Updated 2 months ago
- A repo to for sharing information on Substrate security☆20Feb 19, 2024Updated 2 years ago
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,834Dec 29, 2025Updated 2 months ago
- Shellcode loader designed for evasion. Coded in Rust.☆134Mar 5, 2023Updated 3 years ago
- Binary (In)security tool☆25May 27, 2024Updated last year
- ☆68Dec 22, 2023Updated 2 years ago
- improved shellcode template for b1tg/rust-windows-shellcode☆29May 12, 2021Updated 4 years ago
- ☆79Mar 24, 2023Updated 2 years ago
- Command & Control server and agent written in Rust☆35Sep 27, 2022Updated 3 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,131Oct 21, 2024Updated last year
- Mythic C2 agent targeting Linux and Windows hosts written in Rust☆404Nov 26, 2025Updated 3 months ago
- ☆100Dec 13, 2022Updated 3 years ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆41Nov 28, 2023Updated 2 years ago
- Example of the whitehack for Curve exploit 30/07/23☆19Aug 3, 2023Updated 2 years ago
- ☆88Sep 3, 2025Updated 6 months ago
- ☆37May 15, 2022Updated 3 years ago
- Inject a shellcode in a remote process using Process Hollowing.☆54Sep 18, 2021Updated 4 years ago
- A collection of resources to study Solana smart contract security, auditing, and exploits.☆869Dec 13, 2024Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,311Feb 17, 2026Updated 2 weeks ago
- Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_st…☆2,501Feb 10, 2026Updated 3 weeks ago
- A summary and solutions for 200+ CTF blockchain challenges☆1,074Oct 9, 2025Updated 4 months ago
- Windows shellcode development in Rust☆305Feb 6, 2021Updated 5 years ago
- A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of …☆219Updated this week
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆115Jun 12, 2025Updated 8 months ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- CTF Writeups☆36Nov 26, 2023Updated 2 years ago
- RustBlock-Outpost is the most complete blockchain-oriented Rust knowledge base that was created for educational purposes. Check it to fin…☆58Oct 25, 2023Updated 2 years ago
- Workbook for Introduction to Programmable Cryptography☆34May 3, 2025Updated 10 months ago
- ☆415Sep 30, 2025Updated 5 months ago
- Contains several examples and challenges to use Lambdaworks☆15Sep 7, 2023Updated 2 years ago
- Roadmap to get up to speed with CosmWasm smart contract audits and security vulnerabilities☆100Jul 2, 2024Updated last year
- A curated list of awesome resources for learning and programming with Circom☆23May 15, 2023Updated 2 years ago
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- Inspired by multichain-auditor, this list shows the difference of decimals positions between the original blockchain and others, only whe…☆30Dec 18, 2023Updated 2 years ago
- hy-rs, pronounced high rise, provides a unified and portable to the hypervisor APIs provided by various platforms.☆20Mar 10, 2022Updated 3 years ago
- Sleep Obfuscation in Rust☆278Dec 1, 2025Updated 3 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆164Oct 31, 2024Updated last year