https://github.com/joaoviictorti/shadow-rs
Windows Kernel Rootkit in Rust
https://github.com/joaoviictorti/shadow-rs
kernel ring0 rootkit rust windows
Last synced: 28 days ago
JSON representation
Windows Kernel Rootkit in Rust
- Host: GitHub
- URL: https://github.com/joaoviictorti/shadow-rs
- Owner: joaoviictorti
- License: mit
- Created: 2024-07-26T15:27:57.000Z (9 months ago)
- Default Branch: main
- Last Pushed: 2025-03-06T12:18:01.000Z (2 months ago)
- Last Synced: 2025-04-01T14:01:42.855Z (about 1 month ago)
- Topics: kernel, ring0, rootkit, rust, windows
- Language: Rust
- Homepage:
- Size: 551 KB
- Stars: 532
- Watchers: 7
- Forks: 60
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-offensive-rust - Shadow-rs - Windows Kernel Rootkit in Rust. (Projects)
README
# shadow-rs π¦





![]()
`shadow-rs` is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation while leveraging Rustβs safety and performance features. This project is intended for educational and research purposes.
The project also provides useful crates for developing rootkits, such as [**shadowx**](/shadowx/), which consolidates core logic and essential techniques. It includes rootkit-specific tricks, with plans for additional features in future updates.
The documentation on how to execute CLI commands can be found on the [**Wiki**](https://github.com/joaoviictorti/shadow-rs/wiki)
## Table of Contents
* [Notice](#legal-notice)
* [Features](#features)
* [Installation](#installation)
* [Supported Platforms](#supported-Platforms)
* [Build Instructions](#build-instructions)
* [Driver](#driver)
* [Client](#client)
* [Setup Instructions](#setup-instructions)
* [Enable Test Mode](#enable-test-mode)
* [Debug via Windbg](#debug-via-windbg)
* [Create/Start Service](#createstart-service)
* [Disclaimer](#disclaimer)
* [Contributing to shadow-rs](#contributing-to-shadow-rs)
* [References](#references)
* [License](#license)## Notice
> [!IMPORTANT]
> This project is under development.## Features
### Process Features- β Hide and unhide processes.
- β Modify process signature levels to handle `Protected Processes (PP)` and `Protected Process Light (PPL)`.
- β Protect processes against termination and memory dumping.
- β Elevate process privileges to SYSTEM, granting full administrative access.
- β Terminate target processes.
- β List all protected and hidden processes.### Thread Features
- β Hide and unhide threads.
- β Protect threads from termination or suspension.
- β List all protected and hidden threads### Driver Features
- β Hide and unhide kernel-mode drivers.
- β Enumerate all loaded drivers.
- β Enable or disable Driver Signature Enforcement (`DSE`) to allow loading of unsigned drivers.
- β Blocking Driver Loading.### Callback Features
- β List registered callbacks for process creation, thread creation, image loading, and registry operations.
- β Remove or restore specific callbacks.
- β List all removed callbacks.### Misc Features
- β Capture keystrokes from user input in real-time with kernel-level interception.
- β Disable Microsoft-Windows-Threat-Intelligence (`EtwTi`).
- β Cleaning Driver Artifacts from Memory Dumps in Case of BSOD.
- β Compile Encryption String.
- β Support for Reflective Driver Loading.### User Mode Code Execution
- β Inject shellcode or DLLs into processes using `ZwCreateThreadEx`.
- β Asynchronous Procedure Call (`APC`) injection to execute shellcode or DLLs in alertable threads.
- β Execute shellcode in processes using `Thread Hijacking`.### Module Features
- β Hide modules from process memory listings.
- β Enumerate all loaded modules.### Registry Features
- β Hide and unhide registry keys and values to prevent detection and manipulation.
- β Apply registry protection to prevent key or value deletion or overwriting.### Network Features
- β Hide and unhide network ports from netstat and similar monitoring tools.
## Installation
* Install Rust from [**here**](https://www.rust-lang.org/learn/get-started).
* Follow [Microsoft's guide](https://github.com/microsoft/windows-drivers-rs?tab=readme-ov-file#getting-started) to set up Rust for kernel development.## Supported Platforms
- β Windows 10 / 11 (x64 only)
## Build Instructions
#### Driver
Navigate to the [driver](/driver) directory and build the kernel driver:
```cmd
cargo make default --release
```> [!IMPORTANT]
> Note: The first build must be executed as Administrator. Subsequent builds do not require elevated privileges.To enable mapping support for tools like kdmapper, compile with:
```cmd
cargo make default --release --features mapper
```#### Client
Navigate to the [client](/client) directory and build the user-mode client:
```cmd
cargo build --release
```For compatibility with mapped drivers:
```cmd
cargo build --release --features mapper
```## Setup Instructions
#### Enable Test Mode or Test Signing Mode
```
bcdedit /set testsigning on
```#### Create / Start Service
You can use [Service Control Manager](https://docs.microsoft.com/en-us/windows/win32/services/service-control-manager) or [OSR Driver Loader](https://www.osronline.com/article.cfm%5Earticle=157.htm) to load your driver.
## Debugging
Use Windbg to attach to the kernel and monitor driver activity.
```
bcdedit /debug on
bcdedit /dbgsettings net hostip: port:
```## Contributing to shadow-rs
To contribute to `shadow-rs`, follow these steps:1. Fork this repository.
2. Create a branch: ```git checkout -b ```.
3. Make your changes and confirm them: ```git commit -m ''```.
4. Send to the original branch: ```git push origin / ```.
5. Create the pull request.Alternatively, consult the [**GitHub documentation**](https://docs.github.com/en/pull-requests/collaborating-with-pull-requests) on how to create a pull request.
## Disclaimer
This project is for educational and research purposes. Malicious use of the software is strictly prohibited and discouraged. I am not responsible for any damage caused by improper use of the software.
## References
I want to express my gratitude to these projects that inspired me to create `shadow-rs` and contribute with some features:
* [Hidden](https://github.com/JKornev/hidden)
* [Nidhogg](https://github.com/Idov31/Nidhogg)
* [eagle-rs](https://github.com/memN0ps/eagle-rs)
* [Banshee](https://github.com/eversinc33/Banshee)
* [ReadWriteDriverSample](https://github.com/Kharos102/ReadWriteDriverSample)### Other Essential Resources:
These materials and research have been invaluable in deepening my understanding of Windows kernel development:
* [UnKnoWnCheaTs](https://www.unknowncheats.me)
* [Reactos](https://github.com/mirror/reactos)
* [Blinding EDR On Windows](https://synzack.github.io/Blinding-EDR-On-Windows)
* [Windows Kernel Programming - Pavel](https://leanpub.com/windowskernelprogrammingsecondedition)
* [Rootkit Arsenal Escape Evasion Corners](https://www.amazon.com.br/Rootkit-Arsenal-Escape-Evasion-Corners/dp/144962636X)
* [Rootkits Subverting Windows Greg Hoglund](https://www.amazon.com.br/Rootkits-Subverting-Windows-Greg-Hoglund/dp/032129431)
* [Rootkits Bootkits Reversing Malware Generation](https://www.amazon.com/Rootkits-Bootkits-Reversing-Malware-Generation/dp/1593277164)
* [Memory Forensics](https://imphash.medium.com/windows-process-internals-a-few-concepts-to-know-before-jumping-on-memory-forensics-part-4-16c47b89e826)
* [Leveraging Rootkits for Post-Exploitation - Black Hat](https://www.youtube.com/watch?v=t7Rx3crobZU&pp=ugMICgJwdBABGAHKBRBibGFja2hhdCByb290a2l0)## License
This project is licensed under the [**MIT License**](/LICENSE). See the LICENSE file for details.