Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cyb3rv1c/lowkeyrusty
Rust based process injection tool
https://github.com/cyb3rv1c/lowkeyrusty
edr-bypass process-injection rust-lang shellcode-loader xor-decoder
Last synced: about 1 month ago
JSON representation
Rust based process injection tool
- Host: GitHub
- URL: https://github.com/cyb3rv1c/lowkeyrusty
- Owner: Cyb3rV1c
- License: mit
- Created: 2024-11-19T18:43:05.000Z (about 2 months ago)
- Default Branch: main
- Last Pushed: 2024-11-19T18:57:07.000Z (about 2 months ago)
- Last Synced: 2024-11-19T19:51:46.971Z (about 2 months ago)
- Topics: edr-bypass, process-injection, rust-lang, shellcode-loader, xor-decoder
- Language: Rust
- Homepage:
- Size: 11.7 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
![Screenshot 2024-11-19 at 1 45 25 PM](https://github.com/user-attachments/assets/b2dbea9f-5d14-42c5-8efd-0502a0251627)
**Description:**
A Rust-based process injection tool leveraging XOR-encrypted payloads and dynamic API resolution for enhanced stealth.# Features
**[+] Obfuscation Techniques:** Employs Xor decryption to avoid signature-based detection. & incorporated API obfuscation
**[+] Process Injection** Implements process injection by dynamically resolving Windows APIs (OpenProcess, VirtualAllocEx, WriteProcessMemory, CreateRemoteThreadEx) to inject and execute XOR-encrypted shellcode in a target process.
# Getting Started
# Usage
1. Add the path to your x0r encrypted payload into the main.rs file
2. Specify Secret Key for Decryption
3. Build Cargo and Execute.
# Example Output
**Execution**
# Disclaimer
**This project is intended for educational and research purposes only.**The code provided in this repository is designed to help individuals understand and improve their knowledge of cybersecurity, ethical hacking, and malware analysis techniques. It must not be used for malicious purposes or in any environment where you do not have explicit permission from the owner.