yamakadi / houdini
A rust library that allows you to delete your executable while it's running.
☆90Updated 2 years ago
Alternatives and similar repositories for houdini:
Users that are interested in houdini are comparing it to the libraries listed below
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆48Updated 11 months ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆337Updated last year
- Rust For Windows Cheatsheet☆119Updated 6 months ago
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆259Updated last year
- Linux Enumeration / Privilege escalation tool☆23Updated 4 years ago
- A PoC packer written in Rust!☆68Updated 3 years ago
- A rust library that allows you to host the CLR and execute dotnet binaries.☆216Updated last month
- Dynamically invoke arbitrary unmanaged code☆341Updated 5 months ago
- Call Stack Spoofing for Rust with support #[no_std]☆144Updated last week
- Using fibers to run in-memory code.☆206Updated last year
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆148Updated 4 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆212Updated 2 years ago
- Command & Control server and agent written in Rust☆36Updated 2 years ago
- DLL proxying for lazy people☆158Updated 5 months ago
- Inject a shellcode in a remote process using Process Hollowing.☆50Updated 3 years ago
- ☆46Updated last year
- Some Rust program I wrote while learning Malware Development☆132Updated 3 months ago
- RedLizard Rust TCP Reverse Shell Server/Client☆136Updated last year
- Hide memory artifacts using ROP and hardware breakpoints.☆137Updated last year
- Host CLR and run .NET binaries using Rust☆105Updated last week
- Dynamically invoke arbitrary code with Rust tricks, #[no_std] support, and compatibility for x64, x86, ARM64 and WoW64 (DInvoke)☆76Updated last week
- Shellcode loader designed for evasion. Coded in Rust.☆129Updated 2 years ago
- Call stack spoofing for Rust☆333Updated 3 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆243Updated 10 months ago
- Threadless Process Injection through entry point hijacking☆344Updated 7 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆143Updated 6 months ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆94Updated 3 years ago
- Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antiv…☆116Updated last week
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆91Updated 5 months ago
- Reflective DLL self-loading as a library☆19Updated this week