seqre / rast
A cross platform C2 server written in Rust!
☆36Updated 2 months ago
Alternatives and similar repositories for rast:
Users that are interested in rast are comparing it to the libraries listed below
- Command & Control server and agent written in Rust☆34Updated 2 years ago
- RedLizard Rust TCP Reverse Shell Server/Client☆133Updated last year
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆92Updated 3 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆133Updated 10 months ago
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆28Updated 7 months ago
- Shellcode loader designed for evasion. Coded in Rust.☆121Updated last year
- Some Rust program I wrote while learning Malware Development☆121Updated 5 months ago
- Inject a shellcode in a remote process using Process Hollowing.☆44Updated 3 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆233Updated 6 months ago
- UDP implant☆65Updated 3 years ago
- privilege escalation POCs built in Rust.☆20Updated 2 years ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆132Updated 2 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆179Updated last week
- A rust library that allows you to delete your executable while it's running.☆89Updated last year
- More bind and reverse shells! This time written in Rust.☆50Updated 2 years ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆121Updated 2 weeks ago
- Linux Enumeration / Privilege escalation tool☆23Updated 4 years ago
- Bypassing antivirus detection: old-school malware, new tricks☆55Updated last year
- Executables on Disk? Bleh 🤮☆98Updated last year
- Detect EDR's exceptions by inspecting processes' loaded modules☆124Updated 10 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆79Updated last year
- early cascade injection PoC based on Outflanks blog post, in rust☆50Updated 2 months ago
- CobaltStrike beacon in rust☆182Updated 5 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆103Updated 3 months ago
- Using fibers to run in-memory code.☆199Updated last year
- Rust For Windows Cheatsheet☆115Updated 2 months ago
- Windows Thread Pool Injection Havoc Implementation☆28Updated 9 months ago