RUSTVERSARY is a curated Rust-based toolkit offering diverse malware development and red teaming tools focused on exploitation, persistence, and post-exploitation techniques.
🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.
This toolkit is designed for penetration testers, red teamers, and security enthusiasts who want to develop, test, and understand malware techniques using Rust. It provides practical scripts and tools for process injection, persistence mechanisms, and exploitation to simulate adversary behaviors during security assessments.
Users should have a working Rust environment and familiarity with cargo to build and run these tools. Given the offensive nature of these scripts, they should only be used in authorized environments and for ethical security testing. Proper understanding of Windows internals and process management is recommended to effectively utilize the process injection and persistence techniques.
Clone the repository using: git clone https://github.com/Suredials/RUSTVERSARY.git
Navigate to the desired tool directory within the repository
Build the Rust project using: cargo build --release
Run the compiled binary or script as per the documented usage
cargo run --bin thread_execution_hijacking
Executes the Thread Execution Hijacking script to inject code into a live process.
cargo run --bin process_hollowing
Runs the Process Hollowing tool to hollow out a suspended process and inject malicious code.
cargo run --bin startup_folder
Deploys persistence by placing a script or binary in the startup folder.
cargo run --bin registry_run_keys
Adds malicious components to registry run keys for automatic execution on system startup.
cargo run --bin scheduled_tasks
Schedules tasks via Windows Task Scheduler for recurring or initial execution of payloads.