Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Whitecat18/Rust-for-Malware-Development
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
https://github.com/Whitecat18/Rust-for-Malware-Development
Last synced: about 1 month ago
JSON representation
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
- Host: GitHub
- URL: https://github.com/Whitecat18/Rust-for-Malware-Development
- Owner: Whitecat18
- Created: 2024-02-12T16:55:06.000Z (10 months ago)
- Default Branch: main
- Last Pushed: 2024-04-21T19:29:38.000Z (8 months ago)
- Last Synced: 2024-04-22T14:16:50.295Z (8 months ago)
- Language: Rust
- Homepage:
- Size: 5.58 MB
- Stars: 407
- Watchers: 8
- Forks: 43
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-ccamel - Whitecat18/Rust-for-Malware-Development - This repository contains my complete resources and coding practices for malware development using Rust 🦀. (Rust)
- awesome-offensive-rust - Rust for Malware Development - Rust for malware development and for low level stuffs. (Projects)
README
This repository contains source codes of various techniques used by real-world malware authors, red teamers, threat actors, state-sponsored hacking groups etc. These techniques are well-researched and implemented in Rust.
Repository managed by @5mukx
-----------------
> Note: These are my own research and implementations, derived from the original authors' work. If you discover any errors in these codes, please [contact](https://x.com/5mukx) or contribute to this repository.
## Basics
To Learn Rust -> [Rust Book](https://doc.rust-lang.org/book/)
Windows API [old]-(winapi)-> [WinAPI](https://docs.rs/winapi/latest/winapi/)
Windows API (by Official Microsoft) -> [WinAPI](https://docs.rs/crate/windows/latest)
ntapi Crate -> [NtAPI](https://docs.rs/ntapi/latest/ntapi/)
Windows Internels -> [Link](https://learn.microsoft.com/en-us/sysinternals/resources/windows-internals)
RedTeam Notes -> [Link](https://www.ired.team/)
## Manifest dependencies for [winapi](https://docs.rs/winapi/latest/winapi/) to test and execute
**Copy the dependencics in Cargo.toml file**
```
[dependencies]
winapi = { version = "0.3.9", features = ["winuser","setupapi","dbghelp","wlanapi","winnls","wincon","fileapi","sysinfoapi", "fibersapi","debugapi","winerror", "wininet" , "winhttp" ,"synchapi","securitybaseapi","wincrypt","psapi", "tlhelp32", "heapapi","shellapi", "memoryapi", "processthreadsapi", "errhandlingapi", "winbase", "handleapi", "synchapi"] }
ntapi = "0.4.1"
user32-sys = "0.2.0"
```> Tips for Rust Beginners: Copy and save the dependencies in Cargo.toml File. Versions may be different. Just copy the features when testing.
* **How to Compile this Repository Source Codes [README.](./deps.md)**
* **Cross Compilation Using Docker [README.](./docker.md).**## Rust Malware Blogs regarding this Repostitory
* [Malware Development Essentials Part 1](https://medium.com/system-weakness/malware-development-essentials-part-1-5f4626652ed9)
* [Rust for CyberSecurity and Red Teaming](https://infosecwriteups.com/rust-for-cyber-security-and-red-teaming-275595d3fdec)
* [DLL Injection using Rust](https://smukx.medium.com/dll-injection-using-rust-593b83734c90)
⚠️ These Resources are only for Education Purposes Only ⚠️