Skip to content
View 0xflux's full-sized avatar
🦊
Catching pokemon
🦊
Catching pokemon

Block or report 0xflux

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xflux/Readme.md

Come check my blog where I occasionally talk about cool things.

Pinned Loading

  1. Sanctum Sanctum Public

    Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antivirus. Built in Rust.

    Rust 419 45

  2. Wyrm Wyrm Public

    The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.

    Rust 234 22

  3. Hells-Hollow Hells-Hollow Public

    Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls

    Rust 188 25

  4. wdk-mutex wdk-mutex Public

    An idiomatic Rust mutex type for Windows kernel driver development.

    Rust 11 4

  5. Rust-Hells-Gate Rust-Hells-Gate Public

    Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust

    Rust 71 11

  6. ETW-Bypass-Rust ETW-Bypass-Rust Public

    Event Tracing for Windows EDR bypass in Rust (usermode)

    Rust 31 3