{"id":17383381,"url":"https://github.com/affix/rs-shellcode-runners","last_synced_at":"2025-04-15T09:40:24.054Z","repository":{"id":208837659,"uuid":"722598877","full_name":"affix/rs-shellcode-runners","owner":"affix","description":"Running Shellcode using Rust","archived":false,"fork":false,"pushed_at":"2023-12-11T19:21:26.000Z","size":15,"stargazers_count":6,"open_issues_count":0,"forks_count":0,"subscribers_count":3,"default_branch":"main","last_synced_at":"2025-03-28T18:51:57.841Z","etag":null,"topics":["hacking","osep","pentesting","process-injection","shellcode","shellcode-loader","shellcode-runner"],"latest_commit_sha":null,"homepage":"","language":"Rust","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/affix.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2023-11-23T13:48:17.000Z","updated_at":"2025-03-07T00:09:33.000Z","dependencies_parsed_at":"2023-11-23T15:28:06.115Z","dependency_job_id":"96c67953-43b6-4259-ad08-7bcffc04e6aa","html_url":"https://github.com/affix/rs-shellcode-runners","commit_stats":null,"previous_names":["affix/rs-shellcode-runners"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/affix%2Frs-shellcode-runners","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/affix%2Frs-shellcode-runners/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/affix%2Frs-shellcode-runners/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/affix%2Frs-shellcode-runners/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/affix","download_url":"https://codeload.github.com/affix/rs-shellcode-runners/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":249045371,"owners_count":21203865,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["hacking","osep","pentesting","process-injection","shellcode","shellcode-loader","shellcode-runner"],"created_at":"2024-10-16T07:41:25.730Z","updated_at":"2025-04-15T09:40:24.023Z","avatar_url":"https://github.com/affix.png","language":"Rust","readme":"Rust Windows Shellcode Runner\n------------------------------\n\n## Overview\nThis repository contains a collection of Rust modules designed to execute shellcode using various methods of the native Windows API. Each module demonstrates a unique approach to loading and running shellcode, offering flexibility and adaptability for different use cases.\n\n## Features\n- Multiple Execution Methods: Includes various techniques for executing shellcode using Windows API calls.\n- Rust Implementation: Leveraging Rust's safety features and performance.\n  - Makes use of native Windows API by calling kernel32.dll functions.\n- Detailed Documentation: Each method is thoroughly documented for ease of understanding and use.\n\n## Getting Started\n### Prerequisites\n- Rust (latest stable version): See Rust Installation.\n- Git: To clone the repository.\n- Windows environment for compatibility with Windows API.\n\n## Installation\nClone the repository:\n\n```bash\ngit clone https://github.com/affix/rs-shellcode-runners.git\ncd rust-windows-shellcode-runner\n```\n\n## Usage\nEach method in the repository can be used as follows:\n\n### Basic Runner with CreateThread\n\n[CreateThread](https://learn.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-createthread): The CreateThread function is a part of the Windows API, primarily used for creating a thread to execute within the virtual address space of the calling process. When applied to running shellcode in memory, it offers a method to dynamically execute arbitrary code, often used in legitimate software as well as in various security research and exploitation scenarios.\n\nNavigate to `create-thread ` directory.\n\n```powershell\ncd create-thread\ncargo build\n.\\target\\debug\\create-thread.exe\n```\n\n### Process Injection\n\n[CreateRemoteThread](https://learn.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-createremotethread): \nCreateRemoteThread is a function in the Windows API used to create a thread in the virtual address space of another process. Unlike CreateThread, which creates a thread in the same process, CreateRemoteThread allows for cross-process thread creation. This makes it particularly significant in various programming scenarios, including system monitoring, debugging, and certain types of malware activity.\n\n```powershell\ncd create-remote-thread\ncargo build\n.\\target\\debug\\create-remote-thread.exe\n```\n\n## License\nThis project is licensed under the MIT License.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Faffix%2Frs-shellcode-runners","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Faffix%2Frs-shellcode-runners","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Faffix%2Frs-shellcode-runners/lists"}