Dive into the world of cybersecurity with “RS-Shellcode,” a robust shellcode runner crafted in Rust. This tool leverages the windows-rs library to efficiently execute shellcode on Windows platforms.
Ideal for security researchers and penetration testers, RS-Shellcode simplifies the process of testing and debugging shellcode, enhancing your exploitation toolkit.
A shellcode runner write in Rust use windows-rs.
Install rustup, use nightly toochain.
rustup default nightly
Use msfvenom generate shellcode for test.
msfvenom -p windows/x64/exec CMD=calc.exe --platform win -f raw -o calc64.raw
Build:
cargo build
Usage:
rs_shellcode
USAGE:
rs_shellcode.exe [FLAGS] [OPTIONS] -f <file>
FLAGS:
-b set breakpoint in debugger
-h, --help Prints help information
-V, --version Prints version information
OPTIONS:
-f <file> shellcode path
-o <offset> shellcode offset
Run:
./target/debug/rs_shellcode.exe -f <SHELLCODE_PATH>
When your shellcode not start at offset 0, you can specify the offset use -o
:
./target/debug/rs_shellcode.exe -f <SHELLCODE_PATH> -o 0x30
Run with breakpoint flag (-b
):
./target/debug/rs_shellcode.exe -f <SHELLCODE_PATH> -b
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…