Skip to content

A Rust Loader That Uses Indirect System Calls To Execute AES-Encrypted Payload From Given URL

License

Notifications You must be signed in to change notification settings

Cyb3rV1c/ShadowRust

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Screenshot 2025-03-10 at 2 13 09 PM

Description: This tool streamlines payload execution by leveraging indirect system calls while dynamically retrieving it from a specified URL.

Usage

  1. Clone Repo

  2. Encrypt First Your Payload Locally With AES-Encryption Tool. By Specifing in its code the path to your shellcode file & Specify AES Key.

  3. Build AES-Encryption Tool & Run It

  4. Upload the generated Data.Enc file to your chosen web domain. (Ex; you might start with a local server or use a web front, such as a Discord share link)

  5. Edit ShadowRust source file and specify your URL + AES Key used to encrypt your payload.

  6. Build & Run

Example Output

Execution

Screenshot 2025-03-10 at 2 30 35 PM

Disclaimer

This project is intended for educational and research purposes only.

The code provided in this repository is designed to help individuals understand and improve their knowledge of cybersecurity, ethical hacking, and malware analysis techniques. It must not be used for malicious purposes or in any environment where you do not have explicit permission from the owner.

About

A Rust Loader That Uses Indirect System Calls To Execute AES-Encrypted Payload From Given URL

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published