Skip to content
View Arasimnida's full-sized avatar
🏴‍☠️
🏴‍☠️

Highlights

  • Pro

Block or report Arasimnida

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Arasimnida/README.md

🧑‍🔬☣️ whoami 🧪

Hi. I build Windows malware in Rust just to understand how these things work.
How code becomes presence, how persistence is earned, and how a program becomes something more than just a file and become a nightmare.

They're not just binaries. They're creatures.
They adapt, persist, and sometimes outsmart the system.

Rust is the tool. Curiosity is the motive.
I like the moment when it starts to act like it's alive.

⚠️ WARNING

The code is provided for educational and research purposes only. You are solely responsible for how you use it. Test everything in isolated, controlled environments. Never deploy outside lab conditions.

Malware is illegal and for nerds.


🛠 Projects I’m exploring ¯\(ツ)

Manual in-memory PE loading in Rust. No touching disk, no LoadLibrary.
Implements relocations, imports, TLS, memory protections, and DllMain execution.

Goal: Digital BSL-4.

Non-exhaustive collection of classic and modern DLL/shellcode injection methods.
Everything modular and runnable from the CLI.

Goal: Understand how Windows injectors work.

Rust crate developed with a friend for detecting analysis environments:

  • Tooling presence, MAC patterns, sandbox artifacts, user interaction checks
  • Inspired by academic papers and real-world malware

Goal: Explore dynamic analysis evasion.


🧬 Home-Made Specimens 🦠

Basic Windows backdoor – Digital BSL-3

Simple remote access tool (RAT) using DLL injection and port knocking.
Listens silently until a custom UDP sequence is received, then opens a TCP shell for remote command execution.

Built to explore stealth activation, persistence, and remote control under user context.

Basic infostealer/spyware – Digital BSL-3

Lightweight infostealer with persistence, keylogging, and screenshot capabilities.
Grabs credentials from Chromium-based browsers and exfiltrates via Discord webhooks.

Not advanced, but useful for practicing payload chaining and basic C2 design.


📚 Resources I like

Pinned Loading

  1. reflective-pe-loader reflective-pe-loader Public

    Rust loader that maps and runs a 64-bit Windows DLL entirely from memory—no disk, no LoadLibrary.

    Rust 1

  2. Windows-Backdoor Windows-Backdoor Public

    A proof‑of‑concept demonstration of a simple Windows‑based remote control tool written in Rust.

    Rust 1

  3. VIWP VIWP Public

    Variety of Injection Windowsx64 Primitives: non-exhaustive collection of process injection techniques

    Rust 2

  4. percept-denigrate/antilysis percept-denigrate/antilysis Public

    Rust library implementing state-of-the-art dynamic analysis countering techniques on Windows

    Rust 7

  5. percept-denigrate/windows-malware percept-denigrate/windows-malware Public

    Configurable windows malware with persistence, infostealing, keylogging and screenshots features

    Rust 7