A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals
☆60Nov 24, 2025Updated 4 months ago
Alternatives and similar repositories for Red-Team-Rust
Users that are interested in Red-Team-Rust are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last month
- Some V8 n-day exploits that I've written☆53Mar 1, 2026Updated 3 weeks ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- kerberos in rust for fun and profit☆66Mar 13, 2026Updated 2 weeks ago
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆41Mar 3, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Slides and resources from MCTTP 2025 Talk☆68Oct 26, 2025Updated 5 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 3 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ☆35Jan 16, 2026Updated 2 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆46Feb 24, 2026Updated last month
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- A Model Context Protocol (MCP) server for automating Ludus v1 and v2 cyber range environments through AI assistants. 190+ tools for range…☆76Updated this week
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Using Chromium-based browsers as a proxy for C2 traffic.☆148Dec 6, 2025Updated 3 months ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆57Mar 18, 2026Updated last week
- A simple server and hit counter entirely in Python designed to demonstrate how to write CGI scripts.☆10Aug 20, 2021Updated 4 years ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆35Jan 4, 2026Updated 2 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- Daily C2 threat intelligence feed☆19Updated this week
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 5 months ago
- Fluffy-Barnacle - Disposable, ephemeral network infrastructure powered by GitHub Codespaces.☆98Mar 14, 2026Updated last week
- poc for cve-2025-53772☆46Dec 10, 2025Updated 3 months ago
- A list of all Active Directory machines from HackTheBox☆221Mar 2, 2026Updated 3 weeks ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 2 months ago
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 4 months ago
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- 新技術に関する診断手法ドキュメントのリポジトリ☆16Jul 22, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Shared library injection for *nix using ptrace, in Rust.☆24Aug 13, 2024Updated last year
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆18Jan 13, 2024Updated 2 years ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Oct 3, 2025Updated 5 months ago
- command control framework☆33Mar 19, 2026Updated last week
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 8 months ago
- Living of the Land of Free SaaS☆63Updated this week