Skip to content

πŸ¦€ RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.

Notifications You must be signed in to change notification settings

Suredials/RUSTVERSARY

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

23 Commits
Β 
Β 
Β 
Β 

Repository files navigation

πŸ¦€ RUSTVERSARY πŸ¦€

Welcome to the RustVersary repository! This is a curated collection of tools and scripts that I've developed for malware development using Rust. πŸ›‘οΈ

The repository is structured to reflect the diverse set of skills required for the exam, ranging from enumeration scripts, exploitation tools, to post-exploitation scripts and various utility tools that enhance the penetration testing process. πŸ•΅οΈβ€β™‚οΈ

Each tool and script is documented to explain its purpose, usage, and any prerequisites needed for its operation. This toolkit is intended to serve not only as my personal arsenal for security assessment challenges but also as a resource for fellow security enthusiasts and professionals who are on the same path towards mastering offensive security techniques. πŸ”

Feel free to explore, use, and contribute to this toolkit as we delve into the world of cybersecurity. 🌐

πŸ“š TOOLKIT CATALOG

πŸ’‰ PROCESS INJECTION

Script/Technique Description
Thread Execution Hijacking Adversaries may inject malicious code into hijacked processes in order to evade process-based defenses as well as possibly elevate privileges. Thread Execution Hijacking is a method of executing arbitrary code in the address space of a separate live process 1.
Process Hollowing Adversaries may inject malicious code into suspended and hollowed processes in order to evade process-based defenses. Process hollowing is a method of executing arbitrary code in the address space of a separate live process 2.

πŸ”’ PERSISTENCE

Script/Technique Description
Startup Folder Placing scripts or programs in the startup folder to execute upon system boot can be an effective way to achieve persistence 3.
Registry Run Keys Adversaries may use registry run keys to automatically execute malicious components upon system startup, maintaining persistence 4.
Scheduled Tasks Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code 5.

🀝 HOW TO CONTRIBUTE

Contributions are welcome! If you have any fixes, improvements, or tools to add, please feel free to submit a pull request. πŸ’‘

⚠️ DISCLAIMER

These tools and scripts are provided for educational purposes only. Unauthorized testing of networks and systems is illegal. Always obtain permission before attempting any penetration testing.

Happy Hacking! πŸ˜„

Footnotes

  1. Process Injection: Thread Execution Hijacking ↩

  2. Process Injection: Process Hollowing ↩

  3. Persistence: Startup Folder ↩

  4. Persistence: Registry Run Keys ↩

  5. Persistence: Scheduled Task ↩