awesome-offensive-rust
Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.
https://github.com/ebalo55/awesome-offensive-rust
Last synced: 3 days ago
JSON representation
-
Communities
-
Articles
- Rasta Mouse Custom Beacon Artifacts
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- PIC shellcode: The Rust way
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Exploring RustiveDump
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
- Writing Sliver C2 Extensions in Rust
-
Projects
- Fiber - Using fibers to run in-memory code.
- Ripgrep - Ripgrep recursively searches directories for a regex pattern while respecting your gitignore.
- Bore - bore is a simple CLI tool for making tunnels to localhost.
- Sniffglue - Secure multithreaded packet sniffer.
- Goblin - An impish, cross-platform binary parsing crate, written in Rust.
- Dog - A command-line DNS client written in rust. Dig alternative.
- Pyscan - Python dependency vulnerability scanner, written in Rust.
- WStunnel - Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available.
- Feroxbuster - A fast, simple, recursive content discovery tool written in Rust.
- Findomain - The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, subdomain monitoring, alerts via Discord, Slack and Telegram, multiple API Keys for sources and much more.
- X8 - Hidden parameters discovery suite
- Scrying - A tool for collecting RDP, web and VNC screenshots all in one place.
- Lorsrf - Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load.
- Rusty Hog - A suite of secret scanners built in Rust for performance. Based on TruffleHog.
- Noseyparker - Nosey Parker is a command-line program that finds secrets and sensitive information in textual data and Git history.
- Rust for Malware Development - Rust for malware development and for low level stuffs.
- JoJoLoader - Help Redteam members generate Evasive Anti-virus software Trojan.
- Offensive Rust - A collection of offensive security tools written in Rust.
- Cerbero - Kerberos protocol attacker.
- RustPacker - Template-based shellcode packer written in Rust, with indirect syscall support. Made with <3 for pentesters.
- DInvoke_rs - Dynamically invoke arbitrary unmanaged code.
- Shelter - ROP-based sleep obfuscation to evade memory scanners.
- RustRedOps - RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.
- RustHound - Active Directory data collector for BloodHound written in Rust.
- Venom-rs - Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom).
- Redlotus-rs - Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus).
- Eagle-rs - Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle).
- Skanuvaty - Dangerously fast DNS/network/port scanner
- OffensiveRust - Rust Weaponization for Red Team Engagements.
- ADPT - DLL proxying for lazy people.
- Dumpy - Reuse open handles to dynamically dump LSASS.
- Bin Finder - Detect EDR's exceptions by inspecting processes' loaded modules.
- Unwinder - Call stack spoofing for Rust.
- RustChain - Hide memory artifacts using ROP and hardware breakpoints.
- CustomEntryPoint - Select any exported function in a dll as the new dll's entry point.
- Split - Apply a divide and conquer approach to bypass EDRs.
- EPI - Threadless Process Injection through entry point hijacking.
- RustHollow - Inject a shellcode in a remote process using Process Hollowing.
- Illusion-rs - Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion).
- Matrix-rs - Rusty Hypervisor - Windows Blue Pill Type-2 Hypervisor in Rust (Codename: Matrix)
- Arsenal-rs - Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust.
- Crabby - WebShell for Red Teams, just easily.
- Moonwalk Back - Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
- Ppfuzz - A fast tool to scan client-side prototype pollution vulnerability written in Rust.
- Ripgen - Rust-based high performance domain permutation generator.
- Freeze.rs - Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST.
- Haylxon - Blazing-fast tool to grab screenshots of your domain list right from terminal.
- Hrekt - A really fast http prober.
- Qscan - Quick network scanner library.
- Osintui - OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys.
- Legba - A multiprotocol credentials bruteforcer / password sprayer and enumerator.
- Rust Syscall - Single stub direct and indirect syscalling with runtime SSN resolving for windows.
- GhostDriver - GhostDriver is a Rust-built AV killer tool using BYOVD.
- NovaLdr - Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre).
- IronRDP - Rust implementation of the Microsoft Remote Desktop Protocol (RDP).
- Shadow-rs - Windows Kernel Rootkit in Rust.
- Rustic64 - 64-bit, position-independent shellcode template for Windows in Rust.
- Rustic64Shell - 64-bit, position-independent reverse tcp shell, built in Rust for Windows.
- RustiveDump - LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It can be compiled as shellcode (PIC), supports XOR encryption, and remote file transmission.
- RustVEHSyscalls - Rust port of LayeredSyscall, designed to perform indirect syscalls while generating legitimate API call stack frames by abusing Vectored Exception Handling (VEH) to bypass user-land EDR hooks in Windows.
- Eclipse - Activation Context Hijack to load and run an arbitrary DLL in any desired process.
- RustScan - The Modern Port Scanner.
- Lorsrf - Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load.
-
Useful Libraries
-
Books
- Black Hat Rust - Applied offensive security with Rust.
-
GitAds Sponsored
- ![Sponsored by GitAds - track?source=ebalo55/awesome-offensive-rust@github)
- ![Sponsored by GitAds - track?source=ebalo55/awesome-offensive-rust@github)
Categories
Sub Categories
Keywords
rust
39
windows
13
redteam
12
security
8
hacking
7
security-tools
6
rust-lang
6
pentesting
6
bugbounty
4
offensive-security
4
rootkit
4
pentest
4
osint
3
dns
3
position-independent-code
3
edr-evasion
3
kernel
3
penetration-testing
3
scanner
3
dll
3
web
2
vt-x
2
virtualization
2
ring-1
2
intel
2
hypervisor
2
blue-pill
2
malware-development
2
ring0
2
vulnerability-scanners
2
uefi
2
content-discovery
2
cli
2
command-line
2
networking
2
beacon
2
fuzzing
2
network
2
red-team
2
bootkit
2
cross-platform
2
transparent-proxy
1
url-bruteforcer
1
tunneling
1
websecurity
1
ssrf
1
bruteforce
1
blindssrf
1
udp-tunnel
1
websocket
1