Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/joaoviictorti/shadow-rs
Windows Kernel Rootkit in Rust
https://github.com/joaoviictorti/shadow-rs
kernel ring0 rootkit rust windows
Last synced: 4 days ago
JSON representation
Windows Kernel Rootkit in Rust
- Host: GitHub
- URL: https://github.com/joaoviictorti/shadow-rs
- Owner: joaoviictorti
- License: mit
- Created: 2024-07-26T15:27:57.000Z (7 months ago)
- Default Branch: main
- Last Pushed: 2025-01-30T00:37:41.000Z (15 days ago)
- Last Synced: 2025-02-03T10:41:52.024Z (11 days ago)
- Topics: kernel, ring0, rootkit, rust, windows
- Language: Rust
- Homepage:
- Size: 336 KB
- Stars: 387
- Watchers: 7
- Forks: 50
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-offensive-rust - Shadow-rs - Windows Kernel Rootkit in Rust. (Projects)
README
# shadow-rs π¦
![Rust](https://img.shields.io/badge/made%20with-Rust-red)
![Platform](https://img.shields.io/badge/platform-windows-blueviolet)
![Forks](https://img.shields.io/github/forks/joaoviictorti/shadow-rs)
![Stars](https://img.shields.io/github/stars/joaoviictorti/shadow-rs)
![License](https://img.shields.io/github/license/joaoviictorti/shadow-rs)`shadow-rs` is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation while leveraging Rustβs safety and performance features. This project is intended for educational and research purposes.
The project also provides useful crates for developing rootkits, such as [**shadowx**](/crates/shadowx/), which consolidates core logic and essential techniques. It includes rootkit-specific tricks, with plans for additional features in future updates.
The documentation on how to execute CLI commands can be found on the [**Wiki**](https://github.com/joaoviictorti/shadow-rs/wiki)
## Table of Contents
* [Notice](#legal-notice)
* [Features](#features)
* [Installation](#installation)
* [Supported Platforms](#supported-Platforms)
* [Build Instructions](#build-instructions)
* [Driver](#driver)
* [Client](#client)
* [Setup Instructions](#setup-instructions)
* [Enable Test Mode](#enable-test-mode)
* [Debug via Windbg](#debug-via-windbg)
* [Create/Start Service](#createstart-service)
* [Disclaimer](#disclaimer)
* [Contributing to shadow-rs](#contributing-to-shadow-rs)
* [References](#references)
* [License](#license)## Notice
> [!IMPORTANT]
> This project is under development.## Features
- β Process: Hide / Unhide, Signature (PP / PPL), Protection (Anti-Kill / Dumping), Elevate to System, Terminate, List Protected / Hidden Processes.
- β Thread: Hide / Unhide, Protection (Anti-Kill), List Protected / Hidden Threads.
- β Driver: Hide / Unhide, Enumerate, Signature Enforcement (Enable / Disable).
- β Callback: List / Remove / Restore Callback, List Removed Callbacks.
- β Keylogger & Ports: Enable Keylogger, Hide / Unhide Ports.
- β Module & Registry: Hide / Enumerate Modules, Hide / Unhide Keys & Values, Registry Protection (Anti-Deletion / Overwriting).
- β User Mode Code Execution: Injection via ZwCreateThreadEx (Shellcode / DLL), APC Injection (Shellcode).
- β ETWTI: Disable Event Tracing for Windows (ETW).## Installation
- Install Rust from [**here**](https://www.rust-lang.org/learn/get-started).
- Then follow the instructions provided by [**microsoft**](https://github.com/microsoft/windows-drivers-rs?tab=readme-ov-file#getting-started)## Supported Platforms
- β Windows 10 / 11 (x64)## Build Instructions
To build the project, ensure you have the Rust toolchain installed.
#### Driver
To build the driver, first go to the `driver` folder and then run the following command (When you do the first build you have to be as administrator, but after that you won't need to):
```sh
cargo make default --release
```This driver can be mapped using `kdmapper` among other exploit tools, for example, to put mapping support, use the command:
```sh
cargo make default --release --features mapper
```#### Client
To build the client, first go into the `client` folder, then run the following command:
```sh
cargo build --release
```Since some features of the rootkit are not supported due to the controller mapping, use the following command to build the client with only the commands that can be executed with the mapping:
```sh
cargo build --release --features mapper
```## Setup Instructions
#### Enable Test Mode or Test Signing Mode
```
bcdedit /set testsigning on
```#### [Optional] Debug via Windbg
```
bcdedit /debug on
bcdedit /dbgsettings net hostip: port:
```#### Create / Start Service
You can use [Service Control Manager](https://docs.microsoft.com/en-us/windows/win32/services/service-control-manager) or [OSR Driver Loader](https://www.osronline.com/article.cfm%5Earticle=157.htm) to load your driver.
## Contributing to shadow-rs
To contribute to `shadow-rs`, follow these steps:1. Fork this repository.
2. Create a branch: ```git checkout -b ```.
3. Make your changes and confirm them: ```git commit -m ''```.
4. Send to the original branch: ```git push origin / ```.
5. Create the pull request.Alternatively, consult the [**GitHub documentation**](https://docs.github.com/en/pull-requests/collaborating-with-pull-requests) on how to create a pull request.
## Disclaimer
This project is for educational and research purposes. Malicious use of the software is strictly prohibited and discouraged. I am not responsible for any damage caused by improper use of the software.
## References
- https://www.unknowncheats.me
- https://github.com/JKornev/hidden
- https://github.com/mirror/reactos
- https://github.com/Idov31/Nidhogg
- https://github.com/memN0ps/eagle-rs
- https://github.com/eversinc33/Banshee
- https://synzack.github.io/Blinding-EDR-On-Windows/
- https://github.com/Kharos102/ReadWriteDriverSample
- https://leanpub.com/windowskernelprogrammingsecondedition
- https://www.amazon.com.br/Rootkit-Arsenal-Escape-Evasion-Corners/dp/144962636X
- https://www.amazon.com.br/Rootkits-Subverting-Windows-Greg-Hoglund/dp/0321294319
- https://www.amazon.com/Rootkits-Bootkits-Reversing-Malware-Generation/dp/1593277164
- https://www.youtube.com/watch?v=t7Rx3crobZU&pp=ugMICgJwdBABGAHKBRBibGFja2hhdCByb290a2l0
- https://imphash.medium.com/windows-process-internals-a-few-concepts-to-know-before-jumping-on-memory-forensics-part-4-16c47b89e826## License
This project is licensed under the [**MIT License**](/LICENSE). See the LICENSE file for details.