Link : A Command And Control Framework Written In Rust

Link provides MacOS, Linux and Windows implants which may lack the necessary evasive tradecraft provided by other more mature command and control frameworks.

Tested on Linux only.

Features

Hopefully this list expands for humans to actually want to use this:

  • HTTPS communication
  • Process injection
  • In-memory .NET assembly execution
  • SharpCollection tools
  • sRDI implementation for shellcode generation
  • Windows link reloads DLLs from disk into current process

Build Process

  • Clone or download the repo
  • cargo run if you are eager to run it right now
  • cargo build --release to build the link server executable

For more information check out Installation and Usage.

R K

Recent Posts

BypassAV : Techniques To Evade Antivirus And EDR Systems

BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…

15 hours ago

ComDotNetExploit : Exploiting Windows Protected Process Light (PPL)

ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…

15 hours ago

Trigon : A Revolutionary Kernel Exploit For iOS

Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…

15 hours ago

Bug Bounty Report Templates : Enhancing Efficiency In Vulnerability Reporting

Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…

15 hours ago

FullBypass : A Tool For AMSI And PowerShell CLM Bypass

FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…

16 hours ago

Carseat : A Python Implementation Of Seatbelt

Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool,…

20 hours ago