shaheeryasirofficial / Red-Team-RustView external linksLinks
A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals
☆58Nov 24, 2025Updated 2 months ago
Alternatives and similar repositories for Red-Team-Rust
Users that are interested in Red-Team-Rust are comparing it to the libraries listed below
Sorting:
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated last month
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Nov 27, 2025Updated 2 months ago
- Slides and resources from MCTTP 2025 Talk☆66Oct 26, 2025Updated 3 months ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆55Jan 17, 2026Updated 3 weeks ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated last month
- Daily C2 threat intelligence feed☆19Updated this week
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 2 months ago
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆69Dec 31, 2025Updated last month
- Using Chromium-based browsers as a proxy for C2 traffic.☆141Dec 6, 2025Updated 2 months ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to…☆41Nov 4, 2025Updated 3 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆25Dec 20, 2025Updated last month
- Lightweight && straight forward command-line tool for searching and downloading exploits from Exploit-DB.☆45Jan 22, 2026Updated 3 weeks ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆33Jan 4, 2026Updated last month
- A list of all Active Directory machines from HackTheBox☆213Jan 25, 2026Updated 2 weeks ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Jan 5, 2026Updated last month
- ☆36Jul 1, 2025Updated 7 months ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆43Feb 7, 2026Updated last week
- Command and Control Framework using powershell implants☆35Jun 17, 2025Updated 7 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆90Dec 28, 2025Updated last month
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆17Jan 13, 2024Updated 2 years ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆42Nov 4, 2025Updated 3 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 3 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆63Jan 13, 2026Updated last month
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆33Aug 18, 2025Updated 5 months ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Oct 3, 2025Updated 4 months ago
- A BOF that's a BOF Loader and more☆196Jan 17, 2026Updated 3 weeks ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆232Feb 3, 2026Updated last week
- A frightfully intelligent algorithmic trading automaton of noble birth. Sir Reginald's prime directive: to acquire undervalued assets pos…☆40Sep 18, 2025Updated 4 months ago
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆142Updated this week
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆65Jan 21, 2026Updated 3 weeks ago
- ☆25Jan 11, 2023Updated 3 years ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆35May 1, 2025Updated 9 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆73Nov 10, 2025Updated 3 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆123Nov 17, 2025Updated 2 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆81Jan 26, 2026Updated 2 weeks ago