Dive into the world of cybersecurity with “RS-Shellcode,” a robust shellcode runner crafted in Rust. This tool leverages the windows-rs library to efficiently execute shellcode on Windows platforms.
Ideal for security researchers and penetration testers, RS-Shellcode simplifies the process of testing and debugging shellcode, enhancing your exploitation toolkit.
A shellcode runner write in Rust use windows-rs.
Install rustup, use nightly toochain.
rustup default nightly
Use msfvenom generate shellcode for test.
msfvenom -p windows/x64/exec CMD=calc.exe --platform win -f raw -o calc64.raw
Build:
cargo build
Usage:
rs_shellcode
USAGE:
rs_shellcode.exe [FLAGS] [OPTIONS] -f <file>
FLAGS:
-b set breakpoint in debugger
-h, --help Prints help information
-V, --version Prints version information
OPTIONS:
-f <file> shellcode path
-o <offset> shellcode offset
Run:
./target/debug/rs_shellcode.exe -f <SHELLCODE_PATH>
When your shellcode not start at offset 0, you can specify the offset use -o
:
./target/debug/rs_shellcode.exe -f <SHELLCODE_PATH> -o 0x30
Run with breakpoint flag (-b
):
./target/debug/rs_shellcode.exe -f <SHELLCODE_PATH> -b
Starship is a powerful, minimal, and highly customizable cross-shell prompt designed to enhance the terminal…
Lemmy is an innovative, open-source platform designed for link aggregation and discussion, providing a decentralized…
The latest release of ImHex v1.37.0 introduces a host of exciting features and improvements, enhancing…
Ghauri is a cutting-edge, cross-platform tool designed to automate the detection and exploitation of SQL…
Writing tools have become indispensable for individuals looking to enhance their writing efficiency, accuracy, and…
PatchWerk is a proof-of-concept (PoC) tool designed to clean NTDLL syscall stubs by patching syscall…