☆16Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for how-to-create-a-dll-using-rust
Users that are interested in how-to-create-a-dll-using-rust are comparing it to the libraries listed below
Sorting:
- ☆15May 30, 2025Updated 9 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- hack3270 is a python3 based tool to manipulate tn3270 data streams, specifically to perform application penetration testing of mainframe …☆24Feb 21, 2026Updated 2 weeks ago
- 在cobaltstrike中使用的bof工具集,收集整理验证好用的bof。☆17Sep 30, 2021Updated 4 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆37Aug 5, 2025Updated 7 months ago
- ProcessGhosting 技术的 rust 实现版本☆26Oct 23, 2024Updated last year
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆55Feb 27, 2026Updated last week
- A simple example of building a blog using Rust, Axum, Tokio, and PostgreSQL.☆33Feb 9, 2025Updated last year
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 8 months ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- ☆15Oct 29, 2024Updated last year
- RACF Database Parser☆12Apr 4, 2024Updated last year
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- Scripts aiding penetration testing of Splunk Enterprise systems☆10Jan 29, 2019Updated 7 years ago
- ☆37Feb 12, 2026Updated 3 weeks ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- DUQU MALWARE SOURCE + BINARY + More coming☆12Feb 6, 2023Updated 3 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- ☆10Jun 26, 2024Updated last year
- This is a simple python binding of Stag Fiducial Marker Detection System☆12Mar 7, 2022Updated 4 years ago
- Deno bindings for pulldown-cmark, a CommonMark-compliant Markdown parser made in Rust, compiled to WebAssembly.☆12Jan 23, 2022Updated 4 years ago
- dcsync bof☆45Feb 13, 2026Updated 3 weeks ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 5 months ago
- ☆12Sep 18, 2015Updated 10 years ago