safedv / Rustic64
64-bit, position-independent implant template for Windows in Rust.
☆125Updated 2 weeks ago
Alternatives and similar repositories for Rustic64:
Users that are interested in Rustic64 are comparing it to the libraries listed below
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆143Updated 6 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆76Updated 2 months ago
- An example reference design for a proposed BOF PE☆163Updated 3 weeks ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆179Updated 3 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆63Updated 2 weeks ago
- A Mythic agent for Windows written in C☆121Updated 2 weeks ago
- ☆114Updated last month
- Shellcode loader that executes embedded Lua from Rust.☆113Updated 4 months ago
- Port of Cobalt Strike's Process Inject Kit☆175Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- ☆126Updated 8 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆95Updated last month
- ☆109Updated 3 months ago
- ForsHops☆126Updated last month
- shell code example☆48Updated 3 weeks ago
- Template-based generation of shellcode loaders☆77Updated last year
- BOF with Synthetic Stackframe☆145Updated 2 months ago
- ☆106Updated 3 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆156Updated 2 weeks ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆187Updated 5 months ago
- Malware?☆70Updated 7 months ago
- Early Bird APC Injection in Rust☆57Updated 7 months ago
- Bypass LSA protection using the BYODLL technique☆158Updated 7 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆210Updated 2 months ago
- ☆123Updated last year
- ☆154Updated 4 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆74Updated 8 months ago
- Ghosting-AMSI☆159Updated 2 weeks ago
- ☆61Updated 11 months ago
- 🧠 The ultimate, community-curated resource for Beacon Object Files (BOFs) — tutorials, how-tos, deep dives, and reference materials.☆65Updated 2 weeks ago