Skip to content
View SecStarBot's full-sized avatar

Block or report SecStarBot

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
16 stars written in Rust
Clear filter

Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available

Rust 5,848 468 Updated Oct 29, 2025

A proxy to expose real tls handshake to the firewall

Rust 2,540 286 Updated Apr 25, 2025

Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.

Rust 2,157 119 Updated Oct 21, 2025

牛屎花 一款基于WEB界面的远程主机管理工具

Rust 857 152 Updated May 9, 2023

Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST

Rust 720 88 Updated Aug 18, 2023

🤖 Kill The Protected Process 🤖

Rust 441 63 Updated May 29, 2024

CVE-2023-34312

Rust 421 74 Updated May 27, 2023

Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)

Rust 351 47 Updated Mar 2, 2024

Threadless Process Injection through entry point hijacking

Rust 348 35 Updated Sep 10, 2024

A COFF loader made in Rust

Rust 314 50 Updated Aug 20, 2025

Single stub direct and indirect syscalling with runtime SSN resolving for windows.

Rust 227 34 Updated Mar 23, 2023

基于rustdesk修改的远程桌面软件,将agent部分分离出来

Rust 223 57 Updated Nov 14, 2023

CobaltStrike beacon in rust

Rust 207 31 Updated Aug 10, 2024

(First Public?) Sample of unhooking ntdll (All Exports & IAT imports) hooks in Rust using in-memory disassembly, avoiding direct syscalls and all hooked functions (incl. hooked NtProtectVirtualMemory)

Rust 134 18 Updated Mar 3, 2025

Detect EDR's exceptions by inspecting processes' loaded modules

Rust 130 19 Updated Mar 15, 2024

A memory-based evasion technique which makes shellcode invisible from process start to end.

Rust 16 9 Updated Aug 14, 2023