Skip to content

Commit 42aa2c4

Browse files
committed
REpo Structure
Making the PoC Repository well documented and Structured.
1 parent 254cdf0 commit 42aa2c4

File tree

16 files changed

+592
-576
lines changed

16 files changed

+592
-576
lines changed

EDRChecker/Cargo.lock

-54
This file was deleted.

MessageBoxes/README.md

+4-1
Original file line numberDiff line numberDiff line change
@@ -1 +1,4 @@
1-
Implementing MsgboXes using WinAPI
1+
Implementing MsgboXes using WinAPI
2+
3+
* [MessageBoxA](./MessageBoxA/src/main.rs)
4+
* [MessageBoxW](./MessageBoxW/main.rs)

Named_Pipe/README.md

+4-1
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,12 @@
22

33
This repository contains two programs demonstrating inter-process communication (IPC) using named pipes on Windows:-
44

5+
Download IPC Client & Server: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Named_Pipe)
56

67
* [named_pipe_server](./pipe_server/): A server that creates a named pipe and sends a message to connected clients.
8+
79
* [named_pipe_client](./pipe_client/): A client that connects to the server named pipe and reads the message.
810

9-
---> Under Construction
11+
## Credits / Resources
1012

13+
* https://learn.microsoft.com/en-us/dotnet/standard/io/how-to-use-named-pipes-for-network-interprocess-communication

NtApi/README.md

+1
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,5 @@ Here you can find the ntapi to perform PoC operations.
55
- [NtMapViewOfSection](./NtMapViewOfSection/)
66
- [Shellcode Execution using NtApi](./Shellcode_Exectuion_NtApi/)
77

8+
89
Download Ntapi PoC's: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/NtApi/)

README.md

+4
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@
2828
| [Process Herpaderping](./Process/Herpaderping/) | Process Herpaderping Written in Rust. |
2929
| [NtCreateUserProcess](./NtCreateUserProcess) | Launching the Process using NtCreateUserProcess API. |
3030
| [Named Pipes](./Named_Pipe/) | Demonstrating [IPC](https://learn.microsoft.com/en-us/windows/win32/ipc/interprocess-communications) using named pipes on Windows |
31+
| [PE Analyzer](https://github.com/Whitecat18/PE-Analyzer.rs.git) | Extracts PE Information at CLI. |
3132
| [BlockHandle](./BlockHandle/) | Block Handles using SDDL PoC. |
3233
| [Dynamic Export Table PEB](./base_addr_locator) | Calls Windows Function by searching memory. |
3334
| [API Hammering](api_hammering) | API Hammering techniques. |
@@ -54,9 +55,11 @@
5455
| [Malware DSA](shellcode_exec/DSA_Exec) | Implementing malwares using DSA (Data Structures and Algorithms) Concept. |
5556
| [Shellcode Obfuscation](obfuscation) | Obfuscate and deobfuscate shellcode using Ipv4, Ipv6, MAC, UUiD formats. |
5657
| [EDR Checker](EDRChecker) | Check for the presence of EDR's tools, AV softwares, and other security-related applications on a Windows system. |
58+
| [Timer](./timer/) | A Program that uses Time-based execution control mechanism. |
5759
| [Keylogger Dropper](keylog_dropper) | Downloads keylogger and sender on victim PC and executes in background. |
5860
| [Rand_Fill](Malware_Tips/rand_fill/) | A Small Parallel Program that Deletes All Files on Disk and Fills with Random Bytes, Making the Recovery Process Impossible. |
5961
| [Encryfer-X](Malware-Samples/Encryfer/) | Ransomware written by combining all Possible POC techniques. |
62+
| [Github Stealers](./stealer/GitHub_API/)
6063

6164
## Encryption Techniques
6265

@@ -76,6 +79,7 @@
7679
| [SystemFunction032/033](./Encryption%20Methods/SystemFunction032_033/) | Encrypt and Decrypt shellcode using undocumented winapi function. |
7780

7881

82+
7983
Click Here to download the Repository: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development)
8084

8185
## Manifest dependencies for [winapi](https://docs.rs/winapi/latest/winapi/) to test and execute

Recon/extract_wifi/Cargo.toml

-12
This file was deleted.

Recon/extract_wifi/README.md

-19
This file was deleted.

Reverse Shell/README.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11

22
## Rust Simple Client Server Reverse Shell
33

4-
**Rev Receive** -> Client
5-
6-
**Rev Shell** -> Server
4+
Downlaod Reverse Shell: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Reverse%20Shell)
75

6+
* **Rev Receive** -> [Client](./rev_receive/)
87

8+
* **Rev Shell** -> [Server](./rev_shell/)

analysis/PE_Analyzer1/Cargo.toml

+11-1
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,14 @@ version = "0.1.0"
44
edition = "2021"
55

66
[dependencies]
7-
winapi = { version = "0.3.9", features = ["winnt", "memoryapi", "processthreadsapi", "synchapi"] }
7+
byteorder = "1.5.0"
8+
winapi = { version = "0.3.9", features = [
9+
"winnt",
10+
"memoryapi",
11+
"processthreadsapi",
12+
"synchapi",
13+
"fileapi",
14+
"errhandlingapi",
15+
"handleapi",
16+
"heapapi"
17+
] }

analysis/PE_Analyzer1/README.md

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
1-
# PE_Analyzer1
1+
# PE_Analyzer [Main] Rust
22

33
A Rust-based PE (Portable Executable) file analyzer that provides detailed information about Windows executable files.
44

5+
![PoC Image](./image.png)
6+
57
## Features
68

79
- Parse and analyze PE file headers

analysis/PE_Analyzer1/image.png

146 KB
Loading

0 commit comments

Comments
 (0)