seqre / rast
A cross platform C2 server written in Rust!
☆43Updated last month
Alternatives and similar repositories for rast:
Users that are interested in rast are comparing it to the libraries listed below
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆40Updated 10 months ago
- Command & Control server and agent written in Rust☆36Updated 2 years ago
- RedLizard Rust TCP Reverse Shell Server/Client☆136Updated last year
- Some Rust program I wrote while learning Malware Development☆131Updated 2 months ago
- Host CLR and run .NET binaries using Rust☆98Updated 2 weeks ago
- Shellcode loader designed for evasion. Coded in Rust.☆128Updated 2 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆242Updated 9 months ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆153Updated last year
- Inject a shellcode in a remote process using Process Hollowing.☆50Updated 3 years ago
- A runas implementation with extra features in Rust☆38Updated 2 weeks ago
- privilege escalation POCs built in Rust.☆19Updated 2 years ago
- UDP implant☆66Updated 3 years ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆94Updated 3 years ago
- Rust For Windows Cheatsheet☆119Updated 5 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆123Updated 6 months ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆335Updated last year
- A rust library that allows you to delete your executable while it's running.☆89Updated 2 years ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆205Updated 2 months ago
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆141Updated 4 years ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆251Updated last year
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆142Updated 5 months ago
- CobaltStrike beacon in rust☆185Updated 8 months ago
- Rusty Impersonate☆95Updated last year
- A rust library that allows you to host the CLR and execute dotnet binaries.☆216Updated last month
- Call Stack Spoofing for Rust with support #[no_std]☆83Updated this week
- Using fibers to run in-memory code.☆206Updated last year
- A dirty PoC for a reverse shell with cool features in Rust☆182Updated 7 months ago
- Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antiv…☆107Updated this week
- WIP shellcode loader in nim with EDR evasion techniques☆212Updated 3 years ago
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library☆30Updated 2 years ago