Skip to content

Commit ce773aa

Browse files
committed
Some README Changes
1 parent 79fe227 commit ce773aa

File tree

2 files changed

+46
-35
lines changed

2 files changed

+46
-35
lines changed

README.md

Lines changed: 40 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -20,39 +20,43 @@
2020
2121
## Context
2222

23-
* [Process Injection](Process-Injection): Process Injection Techniques using Rust.
24-
* [Process Injection 2](Process): Process Injection Code Snippet 2.
25-
* [Process Ghosting](ProcessGhosting/): Process Ghosting Technique Written in Rust.
26-
* [Process Hypnosis](ProcessHypnosis/): Process Hypnosis Technique Written in Rust.
27-
* [Process Herpaderping](./Process/Herpaderping/): Process Herpaderping Written in Rust.
28-
* [API Hammering](api_hammering): API Hammering techniques.
29-
* [Early Cascade Injection](Early%20Cascade%20Injection): Early-Cascade Injection POC written in Rust.
30-
* [Encryption Methods](/Encryption%20Methods): Methods to Encrypt and Execute Payloads.
31-
* [Enumeration](Enumeration): Enumeration Modules to save your time.
32-
* [Malware Samples](Malware-Samples): Written malwares based on Real world activities.
33-
* [Metadata Modification](Metadata_Modification/): Extract and Embed custom metadata to our Binary File.
34-
* [Keyloggers](Keyloggers): Custom Implementation of Keyloggers written in Rust.
35-
* [DLL Injection](dll_injection): DLL injection in Rust.
36-
* [Code Snippet](Malware_Tips): Helps to perform certain malware operations.
37-
* [NTAPI Implementation](NtApi): Code snippet of using ntapi.
38-
* [Extract Wifi Passwords](Recon/extract_wifi): Extract Windows Stored Wifi Passwords.
39-
* [Reverse Shell Rust](Reverse%20Shell): Rust Client Server Reverse Shell.
40-
* [RegShell](RegShell): Store and Execute shellcode in Registry.
41-
* [Thread Hijacking](Threads): Thread Hijacking code Snippet.
42-
* [Self Delete](./Self-Deletion-Techniques/): Techniques to Self Delete an running binary file.
43-
* [Position Independent Series](position%20independent): Position independent series in Rust.
44-
* [Shellcode Execution methods](shellcode_exec): Shellcode execution methods using WinApi's.
45-
* [Sleep Obfuscation](Sleep_Obfuscations/Ekko): Sleep Obfuscation implementation in Rust.
46-
* [Syscalls](syscalls/): Syscall Implementation using system call STUB [Direct/Indirect] methods.
47-
* [BSOD](BSOD): Causes BSOD when Executing.
48-
* [Persistence](Persistence): Persistence Code Snippet.
49-
* [UAC Bypass CMSTP](uac-bypass-cmstp/): Bypass UAC by elevating CMSTP.exe
50-
* [Malware DSA](shellcode_exec/DSA_Exec): Implementing malwares using DSA (Data Structures and Algorithms) Concept.
51-
* [Shellcode Obfuscation](obfuscation): Obfuscate and deobfuscate shellcode using Ipv4, Ipv6, MAC, UUiD formats.
52-
* [EDR Checker](EDRChecker): check for the presence of EDR's tools, AV softwares, and other security-related applications on a Windows system.
53-
* [Keylogger Dropper](keylog_dropper): Downloads keylogger and sender on victim PC and exectutes in background.
54-
* [Rand_Fill](Malware_Tips/rand_fill/): A Small Parallel Program that Deletes All Files on Disk and Fills with Random Bytes, Making the Recovery Process Impossible.
55-
* [Encryfer-X](Malware-Samples/Encryfer/): Ransomware written by combining all Possible POC techniques.
23+
| Techniques | Description |
24+
|-----------------------------------------------------------|-----------------------------------------------------------------------------|
25+
| [Process Injection](Process-Injection) | Process Injection Techniques using Rust. |
26+
| [Process Injection 2](Process) | Process Injection Code Snippet 2. |
27+
| [Process Ghosting](ProcessGhosting/) | Process Ghosting Technique Written in Rust. |
28+
| [Process Hypnosis](ProcessHypnosis/) | Process Hypnosis Technique Written in Rust. |
29+
| [Process Herpaderping](./Process/Herpaderping/) | Process Herpaderping Written in Rust. |
30+
| [API Hammering](api_hammering) | API Hammering techniques. |
31+
| [Early Cascade Injection](Early%20Cascade%20Injection) | Early-Cascade Injection POC written in Rust. |
32+
| [Encryption Methods](/Encryption%20Methods) | Methods to Encrypt and Execute Payloads. |
33+
| [Enumeration](Enumeration) | Enumeration Modules to save your time. |
34+
| [Malware Samples](Malware-Samples) | Written malwares based on Real world activities. |
35+
| [Metadata Modification](Metadata_Modification/) | Extract and Embed custom metadata to our Binary File. |
36+
| [Keyloggers](Keyloggers) | Custom Implementation of Keyloggers written in Rust. |
37+
| [DLL Injection](dll_injection) | DLL injection in Rust. |
38+
| [Code Snippet](Malware_Tips) | Helps to perform certain malware operations. |
39+
| [NTAPI Implementation](NtApi) | Code snippet of using ntapi. |
40+
| [Extract Wifi Passwords](Recon/extract_wifi) | Extract Windows Stored Wifi Passwords. |
41+
| [Reverse Shell Rust](Reverse%20Shell) | Rust Client Server Reverse Shell. |
42+
| [RegShell](RegShell) | Store and Execute shellcode in Registry. |
43+
| [Thread Hijacking](Threads) | Thread Hijacking code Snippet. |
44+
| [Self Delete](./Self-Deletion-Techniques/) | Techniques to Self Delete an running binary file. |
45+
| [Position Independent Series](position%20independent) | Position independent series in Rust. |
46+
| [Shellcode Execution methods](shellcode_exec) | Shellcode execution methods using WinApi's. |
47+
| [Sleep Obfuscation](Sleep_Obfuscations/Ekko) | Sleep Obfuscation implementation in Rust. |
48+
| [Syscalls](syscalls/) | Syscall Implementation using system call STUB [Direct/Indirect] methods. |
49+
| [BSOD](BSOD) | Causes BSOD when Executing. |
50+
| [Persistence](Persistence) | Persistence Code Snippet. |
51+
| [UAC Bypass CMSTP](uac-bypass-cmstp/) | Bypass UAC by elevating CMSTP.exe |
52+
| [Malware DSA](shellcode_exec/DSA_Exec) | Implementing malwares using DSA (Data Structures and Algorithms) Concept. |
53+
| [Shellcode Obfuscation](obfuscation) | Obfuscate and deobfuscate shellcode using Ipv4, Ipv6, MAC, UUiD formats. |
54+
| [EDR Checker](EDRChecker) | Check for the presence of EDR's tools, AV softwares, and other security-related applications on a Windows system. |
55+
| [Keylogger Dropper](keylog_dropper) | Downloads keylogger and sender on victim PC and executes in background. |
56+
| [Rand_Fill](Malware_Tips/rand_fill/) | A Small Parallel Program that Deletes All Files on Disk and Fills with Random Bytes, Making the Recovery Process Impossible. |
57+
| [Encryfer-X](Malware-Samples/Encryfer/) | Ransomware written by combining all Possible POC techniques. |
58+
59+
5660

5761

5862
## Manifest dependencies for [winapi](https://docs.rs/winapi/latest/winapi/) to test and execute
@@ -67,8 +71,9 @@ ntapi = "0.4.1"
6771

6872
> Tips for Rust Beginners: Copy and save the dependencies in Cargo.toml File. Versions may be different. Just copy the features when testing.
6973
70-
* **How to Compile this Repository Source Codes [README.](./deps.md)**
71-
* **Cross Compilation Using Docker [README.](./docker.md).**
74+
* New to Rust ? : Please Follow the steps here **[Compile](./deps.md)**
75+
* **How to Compile this Repository Source Codes **[README](./deps.md)**
76+
* **Cross Compilation Using Docker [READMe](./docker.md).**
7277

7378
## Rust Malware Blogs regarding this Repostitory
7479

deps.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,12 @@ Before that, make sure you have imported the winapi package.
3939

4040
Build the project!
4141

42+
For compiling the project, go into the project directory and execute:
43+
`cargo build`
44+
45+
This will use your default toolchain. If you want to build the final "release" version execute: `cargo build --release`
46+
47+
4248
<br>
4349
<div align="center"> <img src="./images/cargo_build.png" alt="build_project" width="50%"> </div>
4450

0 commit comments

Comments
 (0)