seqre / rastLinks
A cross platform C2 server written in Rust!
☆51Updated 3 weeks ago
Alternatives and similar repositories for rast
Users that are interested in rast are comparing it to the libraries listed below
Sorting:
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆79Updated last year
- Some Rust program I wrote while learning Malware Development☆159Updated 11 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆259Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆161Updated last year
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆41Updated last year
- Shellcode loader designed for evasion. Coded in Rust.☆133Updated 2 years ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆354Updated last year
- Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.☆312Updated 6 months ago
- Memory Obfuscation in Rust☆270Updated last month
- Call Stack Spoofing for Rust☆208Updated last month
- Using fibers to run in-memory code.☆239Updated 2 years ago
- Nameless C2 - A C2 with all its components written in Rust☆283Updated last year
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆109Updated 7 months ago
- RedLizard Rust TCP Reverse Shell Server/Client☆140Updated 2 years ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆230Updated 10 months ago
- A dirty PoC for a reverse shell with cool features in Rust☆187Updated last month
- ROP-based sleep obfuscation to evade memory scanners☆371Updated 6 months ago
- Command & Control server and agent written in Rust☆35Updated 3 years ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆195Updated last year
- Self-updatable RAT + C2 server + client.☆17Updated last year
- CobaltStrike beacon in rust☆208Updated last year
- yet another AV killer tool using BYOVD☆300Updated 2 years ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆160Updated last year
- A rust library that allows you to delete your executable while it's running.☆91Updated 2 years ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆293Updated 8 months ago
- ☆299Updated 2 years ago
- Bypassing antivirus detection: old-school malware, new tricks☆67Updated 2 years ago
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆161Updated 5 years ago
- A COFF loader made in Rust☆319Updated 4 months ago
- Threadless Process Injection through entry point hijacking☆351Updated last year