|
21 | 21 | - [Related Blogs](#related-blogs) |
22 | 22 | - [Download Repository](#download-as-zip-file) |
23 | 23 | - [Contribution](#contributing-to-rust-for-malware-development) |
| 24 | +- [Credits/References](#Credits-/-References) |
24 | 25 |
|
25 | 26 | ## Malware Techniques |
26 | 27 |
|
|
63 | 64 | | [Sleep Obfuscation](Sleep_Obfuscations/Ekko) | Sleep obfuscation implementation. | |
64 | 65 | | [Direct Syscalls](syscalls/direct_syscalls) | Direct syscall implementation using STUB methods. | |
65 | 66 | | [Indirect Syscalls](syscalls/indirect_syscalls) | Indirect syscall implementation using STUB methods. | |
| 67 | +| [Parallel Syscalls](syscalls/parallel_syscalls/) | Parallel Syscall implementation. | |
66 | 68 | | [BSOD](BSOD) | Triggers a Blue Screen of Death. | |
67 | 69 | | [Persistence](Persistence) | Persistence techniques. | |
68 | 70 | | [UAC Bypass CMSTP](uac-bypass-cmstp) | UAC bypass by elevating CMSTP.exe. | |
@@ -120,4 +122,37 @@ We welcome contributions to the [Rust for Malware Development repository](https: |
120 | 122 | 4. Push your changes to your branch: `git push origin <branch_name>`. |
121 | 123 | 5. Submit a pull request. |
122 | 124 |
|
123 | | -If you have any questions about contributing, refer to the [GitHub documentation](https://docs.github.com/en/pull-requests/collaborating-with-pull-requests). |
| 125 | +If you have any questions about contributing, refer to the [GitHub documentation](https://docs.github.com/en/pull-requests/collaborating-with-pull-requests). |
| 126 | + |
| 127 | +## Credits / References |
| 128 | + |
| 129 | +I would like to express my sincere gratitude to the creators of remarkable projects and fascinating techniques, who provided me with the tools and inspiration needed to create this extraordinary repository. |
| 130 | + |
| 131 | +* [MemN0ps](https://github.com/MemN0ps) |
| 132 | +* [hasherezade](https://github.com/hasherezade) |
| 133 | +* [vxunderground](https://github.com/vxunderground) |
| 134 | +* [NUL0x4C](https://github.com/NUL0x4C) |
| 135 | +* [mrd0x](https://github.com/mrd0x) |
| 136 | +* [Cracked5pider](https://github.com/Cracked5pider) |
| 137 | +* [trickster0](https://github.com/trickster0) |
| 138 | +* [João Victor](https://github.com/joaoviictorti) |
| 139 | +* [Maldev-Academy](https://github.com/Maldev-Academy/) |
| 140 | + |
| 141 | +Each PoC includes a [Credits/Resource](#) section to acknowledge and respect the original creators and their contributions to the community. |
| 142 | + |
| 143 | + |
| 144 | +### Other Essential Resources: |
| 145 | + |
| 146 | +* https://ired.team |
| 147 | +* https://github.com/microsoft/windows-rs |
| 148 | +* https://github.com/retep998/winapi-rs |
| 149 | +* https://github.com/MSxDOS/ntapi |
| 150 | +* https://github.com/janoglezcampos/rust_syscalls |
| 151 | +* https://github.com/rust-osdev/uefi-rs |
| 152 | +* https://discord.gg/rust-lang-community |
| 153 | +* https://github.com/anvie/litcrypt.rs |
| 154 | +* https://balwurk.com/shellcode-evasion-using-webassembly-and-rust |
| 155 | + |
| 156 | +## License |
| 157 | + |
| 158 | +This project is licensed under the [**MIT License**](/LICENSE) |
0 commit comments