seqre / rast
A cross platform C2 server written in Rust!
☆42Updated last week
Alternatives and similar repositories for rast:
Users that are interested in rast are comparing it to the libraries listed below
- RedLizard Rust TCP Reverse Shell Server/Client☆136Updated last year
- Some Rust program I wrote while learning Malware Development☆128Updated last month
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆151Updated last year
- Command & Control server and agent written in Rust☆36Updated 2 years ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆93Updated 3 years ago
- Shellcode loader designed for evasion. Coded in Rust.☆125Updated 2 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆241Updated 9 months ago
- privilege escalation POCs built in Rust.☆19Updated 2 years ago
- 64-bit, position-independent implant template for Windows in Rust.☆116Updated 5 months ago
- A rust library that allows you to delete your executable while it's running.☆88Updated 2 years ago
- Rust For Windows Cheatsheet☆116Updated 5 months ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆38Updated 9 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆196Updated last month
- A dirty PoC for a reverse shell with cool features in Rust☆182Updated 6 months ago
- Host CLR and run .NET binaries using Rust☆92Updated 3 weeks ago
- Using fibers to run in-memory code.☆205Updated last year
- Inject a shellcode in a remote process using Process Hollowing.☆49Updated 3 years ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆136Updated 5 months ago
- Linux Enumeration / Privilege escalation tool☆23Updated 4 years ago
- CobaltStrike beacon in rust☆185Updated 7 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆211Updated 3 months ago
- UDP implant☆66Updated 3 years ago
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆142Updated 4 years ago
- Detect EDR's exceptions by inspecting processes' loaded modules☆130Updated last year
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆334Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆117Updated last week
- (First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls…☆132Updated 3 weeks ago
- Port of Cobalt Strike's Process Inject Kit☆171Updated 3 months ago
- Early Bird APC Injection in Rust☆57Updated 5 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆216Updated last year