Skip to content

Commit cfa9210

Browse files
committed
README Changes
Added Logs and Credits Section
1 parent 825aa41 commit cfa9210

File tree

1 file changed

+36
-1
lines changed

1 file changed

+36
-1
lines changed

README.md

Lines changed: 36 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@
2121
- [Related Blogs](#related-blogs)
2222
- [Download Repository](#download-as-zip-file)
2323
- [Contribution](#contributing-to-rust-for-malware-development)
24+
- [Credits/References](#Credits-/-References)
2425

2526
## Malware Techniques
2627

@@ -63,6 +64,7 @@
6364
| [Sleep Obfuscation](Sleep_Obfuscations/Ekko) | Sleep obfuscation implementation. |
6465
| [Direct Syscalls](syscalls/direct_syscalls) | Direct syscall implementation using STUB methods. |
6566
| [Indirect Syscalls](syscalls/indirect_syscalls) | Indirect syscall implementation using STUB methods. |
67+
| [Parallel Syscalls](syscalls/parallel_syscalls/) | Parallel Syscall implementation. |
6668
| [BSOD](BSOD) | Triggers a Blue Screen of Death. |
6769
| [Persistence](Persistence) | Persistence techniques. |
6870
| [UAC Bypass CMSTP](uac-bypass-cmstp) | UAC bypass by elevating CMSTP.exe. |
@@ -120,4 +122,37 @@ We welcome contributions to the [Rust for Malware Development repository](https:
120122
4. Push your changes to your branch: `git push origin <branch_name>`.
121123
5. Submit a pull request.
122124

123-
If you have any questions about contributing, refer to the [GitHub documentation](https://docs.github.com/en/pull-requests/collaborating-with-pull-requests).
125+
If you have any questions about contributing, refer to the [GitHub documentation](https://docs.github.com/en/pull-requests/collaborating-with-pull-requests).
126+
127+
## Credits / References
128+
129+
I would like to express my sincere gratitude to the creators of remarkable projects and fascinating techniques, who provided me with the tools and inspiration needed to create this extraordinary repository.
130+
131+
* [MemN0ps](https://github.com/MemN0ps)
132+
* [hasherezade](https://github.com/hasherezade)
133+
* [vxunderground](https://github.com/vxunderground)
134+
* [NUL0x4C](https://github.com/NUL0x4C)
135+
* [mrd0x](https://github.com/mrd0x)
136+
* [Cracked5pider](https://github.com/Cracked5pider)
137+
* [trickster0](https://github.com/trickster0)
138+
* [João Victor](https://github.com/joaoviictorti)
139+
* [Maldev-Academy](https://github.com/Maldev-Academy/)
140+
141+
Each PoC includes a [Credits/Resource](#) section to acknowledge and respect the original creators and their contributions to the community.
142+
143+
144+
### Other Essential Resources:
145+
146+
* https://ired.team
147+
* https://github.com/microsoft/windows-rs
148+
* https://github.com/retep998/winapi-rs
149+
* https://github.com/MSxDOS/ntapi
150+
* https://github.com/janoglezcampos/rust_syscalls
151+
* https://github.com/rust-osdev/uefi-rs
152+
* https://discord.gg/rust-lang-community
153+
* https://github.com/anvie/litcrypt.rs
154+
* https://balwurk.com/shellcode-evasion-using-webassembly-and-rust
155+
156+
## License
157+
158+
This project is licensed under the [**MIT License**](/LICENSE)

0 commit comments

Comments
 (0)