Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC
☆64Dec 2, 2024Updated last year
Alternatives and similar repositories for Rusty-Telephone
Users that are interested in Rusty-Telephone are comparing it to the libraries listed below
Sorting:
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆141Jan 18, 2025Updated last year
- macOS dylib stager☆36Jan 22, 2025Updated last year
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- ☆53Mar 26, 2025Updated 11 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated 11 months ago
- ☆17Jan 9, 2025Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Apr 26, 2025Updated 10 months ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- ☆38Apr 15, 2025Updated 10 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago
- Rust crate to parse user-mode minidump files generated on Windows☆18Nov 17, 2025Updated 3 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆76Oct 27, 2025Updated 4 months ago
- UDC2 implementation that provides an ICMP C2 channel☆115Nov 24, 2025Updated 3 months ago
- ☆101Oct 7, 2023Updated 2 years ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆39Jan 23, 2026Updated last month
- Sleep Obfuscation in Rust☆279Dec 1, 2025Updated 3 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆173Nov 28, 2025Updated 3 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆76Sep 8, 2025Updated 5 months ago
- Nameless C2 - A C2 with all its components written in Rust☆283Sep 26, 2024Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated 11 months ago
- ☆36Jul 1, 2025Updated 7 months ago
- ☆26Aug 11, 2025Updated 6 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- Active Directory Firewall☆98Updated this week
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated 2 months ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆22Nov 28, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Dec 11, 2024Updated last year