There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Elevator
UAC bypass by abusing RPC and debug objects.Shelter
ROP-based sleep obfuscation to evade memory scannersEPI
Threadless Process Injection through entry point hijacking.Split
Apply a divide and conquer approach to bypass EDRsLOLBITS
** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + Dinvoke for EDR user-mode hooking evasion.DInvoke_rs
Dynamically invoke arbitrary unmanaged code.Fiber
Using fibers to run in-memory code in a different and stealthy way.Unwinder
Another approach to thread stack spoofing.Dumpy
Reuse open handles to dynamically dump LSASS.RustChain
Hide memory artifacts using ROP and hardware breakpoints.Bin-Finder
Detect EDR's exceptions by inspecting processes' loaded modulesrust_tips_and_tricks
Rust For Windows CheatsheetCustomEntryPoint
Select any exported function in a dll as the new dll's entry point.RustHollow
Inject a shellcode in a remote process using Process Hollowing.Fingeth
Python fingerprint authentication PoC using Ethereum's blockchain and smart contracts.Love Open Source and this site? Check out how you can help us