UAC Bypass using CMSTP in Rust
☆35Dec 6, 2024Updated last year
Alternatives and similar repositories for RustyKeys
Users that are interested in RustyKeys are comparing it to the libraries listed below
Sorting:
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Jan 18, 2025Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 2 months ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Rust template/library for implementing your own COFF loader☆72Jan 27, 2025Updated last year
- A COFF Loader written in Rust☆138Dec 1, 2025Updated 3 months ago
- Windows Thread Pool Injection Havoc Implementation☆33Mar 23, 2024Updated last year
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆115Jun 12, 2025Updated 8 months ago
- A Rust-based dropper for shellcode payloads.☆72Mar 21, 2025Updated 11 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated 11 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 7 months ago
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆75Aug 24, 2025Updated 6 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Generate Proxy DLLs in Rust☆47Sep 2, 2025Updated 5 months ago
- A reflective DLL development template for the Rust programming language☆114Nov 4, 2025Updated 3 months ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- ☆15May 30, 2025Updated 9 months ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- ☆59Oct 24, 2024Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆86Apr 26, 2025Updated 10 months ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 7 months ago
- Implementation of the user-space eBPF VM based on the iovisor version (https://github.com/iovisor/ubpf)☆13Apr 16, 2020Updated 5 years ago
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14May 2, 2024Updated last year
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- POC of GITHUB simple C2 in rust☆52Jul 27, 2025Updated 7 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- Adversary Emulation Framework☆130Jul 1, 2025Updated 8 months ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- A different approach to writing BOFs in rust.☆19Aug 20, 2025Updated 6 months ago
- DeadManSwitch in rust with several triggers (remote local and network)☆16Nov 19, 2025Updated 3 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- Generic PE loader for fast prototyping evasion techniques☆244Jul 2, 2024Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- A structured fuzzing framework built in Rust☆31Oct 10, 2022Updated 3 years ago