trickster0 / OffensiveRustLinks
Rust Weaponization for Red Team Engagements.
☆2,853Updated last year
Alternatives and similar repositories for OffensiveRust
Users that are interested in OffensiveRust are comparing it to the libraries listed below
Sorting:
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust 🦀☆1,634Updated 3 weeks ago
- This repository contains complete resources and coding practices for malware development using Rust 🦀.☆2,481Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,839Updated 2 months ago
- A workshop about Malware Development☆1,669Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,823Updated last year
- The Havoc Framework☆7,610Updated 4 months ago
- Applied offensive security with Rust - https://kerkour.com/black-hat-rust☆4,048Updated 10 months ago
- Notion as a platform for offensive operations☆1,165Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆2,954Updated last year
- This is a repository of resource about Malware techniques☆802Updated 2 years ago
- Resources for Windows exploit development☆1,589Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,443Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,288Updated 9 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,186Updated last month
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,443Updated last year
- Curated list of awesome projects and resources related to Rust and computer security☆490Updated last year
- A collaborative, multi-platform, red teaming framework☆3,753Updated this week
- Collection of various malicious functionality to aid in malware development☆1,678Updated last year
- Offensive Software Exploitation Course☆2,371Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,977Updated last month
- Awesome EDR Bypass Resources For Ethical Hacking☆1,215Updated last week
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,103Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,899Updated last year
- A fast, simple, recursive content discovery tool written in Rust.☆6,678Updated 2 months ago
- A modern 32/64-bit position independent implant template☆1,227Updated 3 months ago
- Organized list of my malware development resources☆1,575Updated 3 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,031Updated 8 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,505Updated 6 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,000Updated this week
- The Network Execution Tool☆4,323Updated this week