Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ebalo55/awesome-offensive-rust
Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.
https://github.com/ebalo55/awesome-offensive-rust
List: awesome-offensive-rust
Last synced: about 1 month ago
JSON representation
Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.
- Host: GitHub
- URL: https://github.com/ebalo55/awesome-offensive-rust
- Owner: ebalo55
- Created: 2024-04-23T04:39:24.000Z (8 months ago)
- Default Branch: master
- Last Pushed: 2024-05-08T16:28:42.000Z (8 months ago)
- Last Synced: 2024-05-22T22:00:51.436Z (7 months ago)
- Size: 32.2 KB
- Stars: 30
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
Awesome Lists containing this project
- ultimate-awesome - awesome-offensive-rust - Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust. (Programming Language Lists / Rust Lists)
README
# Awesome Offensive Rust [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
> Curated list of resources about Rust language used for offensive security & red teaming.
_List inspired by the [awesome](https://github.com/sindresorhus/awesome) list thing._
## Contents
- [Awesome Offensive Rust](#awesome-offensive-rust-)
- [Contents](#contents)
- [Community](#communities)
- [Articles](#articles)
- [Boilerplates](#boilerplates)
- [Books](#books)
- [Projects](#projects)
- [Useful Libraries](#useful-libraries)
- [Contributing](#contributing)
- [License](#license)## Communities
- [Official Rust communities](https://www.rust-lang.org/community)
## Articles
- [Coffee: A COFF loader made in Rust](https://labs.hakaioffsec.com/coffee-a-coff-loader-made-in-rust/)
- [PIC shellcode: The Rust way](https://medium.com/purple-team/pic-shellcode-the-rust-way-4f629fb56009)
- [Rasta Mouse Custom Beacon Artifacts](https://rastamouse.me/custom-beacon-artifacts/)
- [Writing Sliver C2 Extensions in Rust](https://blog.paradoxis.nl/writing-sliver-c2-extensions-in-rust-a95f620266de)## Books
- [Black Hat Rust](https://github.com/skerkour/black-hat-rust) - Applied offensive security with Rust.
## Boilerplates
> Boilerplates for Rust language used for offensive security & red teaming.
>
> ... Coming soon## Projects
- [ADPT](https://github.com/Kudaes/ADPT) - DLL proxying for lazy people.
- [Arsenal-rs](https://github.com/memN0ps/arsenal-rs) - Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust.
- [Bin Finder](https://github.com/Kudaes/Bin-Finder) - Detect EDR's exceptions by inspecting processes' loaded modules.
- [Bore](https://github.com/ekzhang/bore) - bore is a simple CLI tool for making tunnels to localhost.
- [Cerbero](https://github.com/zer1t0/cerbero) - Kerberos protocol attacker.
- [Crabby](https://github.com/ebalo55/crabby) - WebShell for Red Teams, just easily.
- [CustomEntryPoint](https://github.com/Kudaes/CustomEntryPoint) - Select any exported function in a dll as the new dll's entry point.
- [DInvoke_rs](https://github.com/Kudaes/DInvoke_rs) - Dynamically invoke arbitrary unmanaged code.
- [Dog](https://github.com/ogham/dog) - A command-line DNS client written in rust. Dig alternative.
- [Dumpy](https://github.com/Kudaes/Dumpy) - Reuse open handles to dynamically dump LSASS.
- [Eagle-rs](https://github.com/memN0ps/eagle-rs) - Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle).
- [EPI](https://github.com/Kudaes/EPI) - Threadless Process Injection through entry point hijacking.
- [Feroxbuster](https://github.com/epi052/feroxbuster) - A fast, simple, recursive content discovery tool written in Rust.
- [Fiber](https://github.com/Kudaes/Fiber) - Using fibers to run in-memory code.
- [Findomain](https://github.com/Findomain/Findomain) - The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, subdomain monitoring, alerts via Discord, Slack and Telegram, multiple API Keys for sources and much more.
- [Freeze.rs](https://github.com/optiv/Freeze.rs) - Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST.
- [GhostDriver](https://github.com/BlackSnufkin/GhostDriver) - GhostDriver is a Rust-built AV killer tool using BYOVD.
- [Goblin](https://github.com/m4b/goblin) - An impish, cross-platform binary parsing crate, written in Rust.
- [Haylxon](https://github.com/pwnwriter/haylxon) - Blazing-fast tool to grab screenshots of your domain list right from terminal.
- [Hrekt](https://github.com/ethicalhackingplayground/hrekt) - A really fast http prober.
- [Illusion-rs](https://github.com/memN0ps/illusion-rs) - Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion).
- [IronRDP](https://github.com/Devolutions/IronRDP) - Rust implementation of the Microsoft Remote Desktop Protocol (RDP).
- [Legba](https://github.com/evilsocket/legba) - A multiprotocol credentials bruteforcer / password sprayer and enumerator.
- [Lorsrf](https://github.com/knassar702/lorsrf) - Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load.
- [Matrix-rs](https://github.com/memN0ps/matrix-rs) - Rusty Hypervisor - Windows Blue Pill Type-2 Hypervisor in Rust (Codename: Matrix)
- [Moonwalk Back](https://github.com/Aditya-dom/moonwalk-back) - Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
- [Noseyparker](https://github.com/praetorian-inc/noseyparker) - Nosey Parker is a command-line program that finds secrets and sensitive information in textual data and Git history.
- [NovaLdr](https://github.com/BlackSnufkin/NovaLdr.git) - Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre).
- [Offensive Rust](https://github.com/winsecurity/Offensive-Rust) - A collection of offensive security tools written in Rust.
- [OffensiveRust](https://github.com/trickster0/OffensiveRust) - Rust Weaponization for Red Team Engagements.
- [Osintui](https://github.com/wssheldon/osintui) - OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys.
- [Ppfuzz](https://github.com/dwisiswant0/ppfuzz) - A fast tool to scan client-side prototype pollution vulnerability written in Rust.
- [Pyscan](https://github.com/aswinnnn/pyscan) - Python dependency vulnerability scanner, written in Rust.
- [Qscan](https://github.com/0xor0ne/qscan) - Quick network scanner library.
- [Redlotus-rs](https://github.com/memN0ps/redlotus-rs) - Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus).
- [Ripgen](https://github.com/resyncgg/ripgen) - Rust-based high performance domain permutation generator.
- [Ripgrep](https://github.com/BurntSushi/ripgrep) - Ripgrep recursively searches directories for a regex pattern while respecting your gitignore.
- [Rust for Malware Development](https://github.com/Whitecat18/Rust-for-Malware-Development) - Rust for malware development and for low level stuffs.
- [Rust Syscall](https://github.com/janoglezcampos/rust_syscalls) - Single stub direct and indirect syscalling with runtime SSN resolving for windows.
- [RustChain](https://github.com/Kudaes/RustChain) - Hide memory artifacts using ROP and hardware breakpoints.
- [RustHollow](https://github.com/Kudaes/RustHollow) - Inject a shellcode in a remote process using Process Hollowing.
- [RustHound](https://github.com/NH-RED-TEAM/RustHound) - Active Directory data collector for BloodHound written in Rust.
- [Rustic64](https://github.com/safedv/Rustic64) - 64-bit, position-independent shellcode template for Windows in Rust.
- [Rustic64Shell](https://github.com/safedv/Rustic64Shell) - 64-bit, position-independent reverse tcp shell, built in Rust for Windows.
- [RustiveDump](https://github.com/safedv/RustiveDump) - LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It can be compiled as shellcode (PIC), supports XOR encryption, and remote file transmission.
- [RustRedOps](https://github.com/joaoviictorti/RustRedOps) - RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.
- [RustScan](https://github.com/RustScan/RustScan) - The Modern Port Scanner.
- [Rusty Hog](https://github.com/newrelic/rusty-hog) - A suite of secret scanners built in Rust for performance. Based on TruffleHog.
- [RustVEHSyscalls](https://github.com/safedv/RustVEHSyscalls) - Rust port of LayeredSyscall, designed to perform indirect syscalls while generating legitimate API call stack frames by abusing Vectored Exception Handling (VEH) to bypass user-land EDR hooks in Windows.
- [Scrying](https://github.com/nccgroup/scrying) - A tool for collecting RDP, web and VNC screenshots all in one place.
- [Shelter](https://github.com/Kudaes/Shelter) - ROP-based sleep obfuscation to evade memory scanners.
- [Skanuvaty](https://github.com/Esc4iCEscEsc/skanuvaty) - Dangerously fast DNS/network/port scanner
- [Sniffglue](https://github.com/kpcyrd/sniffglue) - Secure multithreaded packet sniffer.
- [Split](https://github.com/Kudaes/Split) - Apply a divide and conquer approach to bypass EDRs.
- [Unwinder](https://github.com/Kudaes/Unwinder) - Call stack spoofing for Rust.
- [Venom-rs](https://github.com/memN0ps/venom-rs) - Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom).
- [WStunnel](https://github.com/erebe/wstunnel) - Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available.
- [X8](https://github.com/Sh1Yo/x8) - Hidden parameters discovery suite## Useful Libraries
- [LibAFL](https://github.com/AFLplusplus/LibAFL) - Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...
- [Litcrypt](https://github.com/anvie/litcrypt.rs) - A Rust compiler plugin to encrypt string literal at compile time.## Contributing
Found an awesome package, article, blog, video etc.? Send me a pull request! Just follow the [guidelines](/CONTRIBUTING.md). Thank you!
## License
[![CC0](http://mirrors.creativecommons.org/presskit/buttons/88x31/svg/cc-zero.svg)](http://creativecommons.org/publicdomain/zero/1.0/)