|
19 | 19 |
|
20 | 20 | > Note: These are my own research and implementations, derived from the original authors' work. If you discover any errors in these codes, please [contact](https://x.com/5mukx) or contribute to this repository.
|
21 | 21 |
|
22 |
| -## Basics |
23 |
| - |
24 |
| -To Learn Rust -> [Rust Book](https://doc.rust-lang.org/book/) |
25 |
| - |
26 |
| -Windows API [old]-(winapi)-> [WinAPI](https://docs.rs/winapi/latest/winapi/) |
27 |
| - |
28 |
| -Windows API (by Official Microsoft) -> [WinAPI](https://docs.rs/crate/windows/latest) |
29 |
| - |
30 |
| -ntapi Crate -> [NtAPI](https://docs.rs/ntapi/latest/ntapi/) |
31 |
| - |
32 |
| -Windows Internels -> [Link](https://learn.microsoft.com/en-us/sysinternals/resources/windows-internals) |
33 |
| - |
34 |
| -RedTeam Notes -> [Link](https://www.ired.team/) |
| 22 | +## Context |
| 23 | + |
| 24 | +* [Encryption Methods](/Encryption%20Methods): Methods to Encrypt and Execute Payloads. |
| 25 | +* [Process Injection](Process-Injection): Process Injection Techniques using Rust. |
| 26 | +* [Malware Samples](Malware-Samples): Written malwares based on Real world activities. |
| 27 | +* [EDR Checker](EDRChecker): check for the presence of EDR's tools, AV softwares, and other security-related applications on a Windows system. |
| 28 | +* [Early Cascade Injection](Early%20Cascade%20Injection): Early Cascade Injection POC written in Rust. |
| 29 | +* [Enumeration](Enumeration): Enumeration Modules to save your time. |
| 30 | +* [Keyloggers](keylogger): My implementations of keyloggers using Rust. |
| 31 | +* [Keylogger Dropper](keylog_dropper): Downloads keylogger and sender on victim PC and exectutes in background. |
| 32 | +* [DLL Injection](dll_injection): DLL injection in Rust. |
| 33 | +* [Code Snippet](Malware_Tips): Helps to perform certain malware operations. |
| 34 | +* [NTAPI Implementation](NtApi): Code snippet of using ntapi. |
| 35 | +* [Extract Wifi Passwords](Recon/extract_wifi): Extract Windows Stored Wifi Passwords. |
| 36 | +* [Reverse Shell Rust](Reverse%20Shell): Rust Client Server Reverse Shell. |
| 37 | +* [Thread Hijacking](Threads): Thread Hijacking code Snippet. |
| 38 | +* [Shellcode Obfuscation](obfuscation): Obfuscate and deobfuscate shellcode using Ipv4, Ipv6, MAC, UUiD formats. |
| 39 | +* [Position Independent Series](position%20independent): Position independent series in Rust. |
| 40 | +* [Shellcode Execution methods](shellcode_exec): Shellcode execution methods using WinApi's. |
| 41 | +* [Sleep Obfuscation](Sleep_Obfuscations/Ekko): Sleep Obfuscation implementation in Rust. |
| 42 | +* [BSOD](BSOD): Causes BSOD when Executing. |
| 43 | +* [Persistence](Persistence): Persistence Code Snippet. |
| 44 | +* [Process Injection 2](Process): Process Injection Code Snippet 2. |
| 45 | +* [Malware DSA](shellcode_exec/DSA_Exec): Implementing malwares using DSA (Data Structures and Algorithms) Concept. |
35 | 46 |
|
36 | 47 | ## Manifest dependencies for [winapi](https://docs.rs/winapi/latest/winapi/) to test and execute
|
37 | 48 |
|
|
0 commit comments