Cyber security

RustRedOps – Advanced Red Team Tooling And Techniques In Rust

“RustRedOps” stands as a groundbreaking repository, pioneering the development of sophisticated Red Team tools and techniques, all crafted in the Rust programming language.

It offers a comprehensive suite of projects aimed at enhancing security assessments and intrusion testing for professionals.

This article delves into the rich array of tools available, from APC injection to encryption and anti-debugging, showcasing the power and flexibility of Rust in cybersecurity operations.

Summary

  • In Construction
  • Overview
  • Contents
  • Resources
  • Requirements
  • Compile
    • Compiling the Project
    • Adding Destination Architectures
    • Compiling for a Specific Architecture
  • How to get started
  • Contributing to RustRedOps
  • Credits / References / Thanks / Motivation

In Construction

The project is still under development

Overview

RustRedOps is a repository that houses various tools and projects related to Red Team operations, developed in Rust.

This repository is dedicated to providing effective and efficient tools for security professionals and penetration testers who want to perform security assessments and intrusion tests.

Contents

The repository is organized into several projects, each with its own purpose and functionality. Here are some examples of the projects included:

  1. APC Injection
    • This project exploits the Asynchronous Code Injection (APC) technique to execute malicious code in target processes.
  2. Early Bird APC Injection
    • It focuses on a variation of APC injection, executing code before the main process starts.
  3. Local Payload Execution
    • This project addresses the direct execution of malicious payloads in a system’s local environment.
  4. Process Argument Spoofing
    • Exploits the technique of masking or altering the arguments of a process to hide malicious activity.
  5. Process Injection (DLL)
    • It focuses on injecting dynamic link libraries (DLL) into running processes to execute malicious code.
  6. Process Injection (Shellcode)
    • It exploits shellcode injection directly into running processes to control or execute malicious tasks.
  7. Local Thread Hijacking
    • This project deals with hijacking the threads of processes running on the local system to execute malicious code.
  8. Remote Thread Hijacking
    • It addresses the hijacking of threads in remote system processes to carry out malicious actions.
  9. Local Function Stomping Injection
    • It focuses on replacing locally running functions with malicious code, changing their default behavior.
  10. Remote Function Stomping Injection
    • It exploits the substitution of functions in remote systems to carry out malicious activities.
  11. Local Mapping Injection
    • Performing malicious code injection via memory mapping into local processes.
  12. Remote Mapping Injection
    • Performing malicious code injection via memory mapping into remote processes.
  13. Minidump-rs
    • Dumping the lsass.exe process.

For more information click here.

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago