https://github.com/brosck/rustscloader
「🔄」A simple code that will load a shellcode directly into RAM memory in a new process
https://github.com/brosck/rustscloader
injection loader memory metasploit msfvenom procecss rust shellcode win32 win64 win86-64 windows winx32 winx64 winx86-64
Last synced: 11 months ago
JSON representation
「🔄」A simple code that will load a shellcode directly into RAM memory in a new process
- Host: GitHub
- URL: https://github.com/brosck/rustscloader
- Owner: brosck
- License: gpl-3.0
- Created: 2023-05-13T18:55:47.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2024-12-07T01:41:19.000Z (over 1 year ago)
- Last Synced: 2025-03-29T07:22:14.543Z (about 1 year ago)
- Topics: injection, loader, memory, metasploit, msfvenom, procecss, rust, shellcode, win32, win64, win86-64, windows, winx32, winx64, winx86-64
- Language: Rust
- Homepage:
- Size: 19.5 KB
- Stars: 8
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
「🔄」About RustSCLoader

RustSCLoader is a simple code that has the intention of loading a shellcode directly into RAM memory in a new process that will be created, called notepad.exe. The library used in the code is known as [winapi](https://docs.rs/winapi/latest/winapi/), which allows the programmer to make calls to Windows API's.
## Build
```
git clone https://github.com/Brosck/RustSCLoader
cd RustSCLoader
cargo build --release
.\target\release\rustscloader.exe
```