RepoPilotOpen in app →

Whitecat18/Rust-for-Malware-Development

Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀

Mixed

Solo project — review before adopting

weakest axis
Use as dependencyMixed

single-maintainer (no co-maintainers visible); no CI workflows detected

Fork & modifyHealthy

Has a license, tests, and CI — clean foundation to fork and modify.

Learn fromHealthy

Documented and popular — useful reference codebase to read through.

Deploy as-isHealthy

No critical CVEs, sane security posture — runnable as-is.

  • Last commit 3d ago
  • MIT licensed
  • Tests present
Show all 5 evidence items →
  • Solo or near-solo (1 contributor active in recent commits)
  • No CI workflows detected
What would change the summary?
  • Use as dependency MixedHealthy if: onboard a second core maintainer

Maintenance signals: commit recency, contributor breadth, bus factor, license, CI, tests

Informational only. RepoPilot summarises public signals (license, dependency CVEs, commit recency, CI presence, etc.) at the time of analysis. Signals can be incomplete or stale. Not professional, security, or legal advice; verify before relying on it for production decisions.

Embed the "Forkable" badge

Paste into your README — live-updates from the latest cached analysis.

Variant:
RepoPilot: Forkable
[![RepoPilot: Forkable](https://repopilot.app/api/badge/whitecat18/rust-for-malware-development?axis=fork)](https://repopilot.app/r/whitecat18/rust-for-malware-development)

Paste at the top of your README.md — renders inline like a shields.io badge.

Preview social card (1200×630)

This card auto-renders when someone shares https://repopilot.app/r/whitecat18/rust-for-malware-development on X, Slack, or LinkedIn.

Onboarding doc

Onboarding: Whitecat18/Rust-for-Malware-Development

Generated by RepoPilot · 2026-05-09 · Source

🤖Agent protocol

If you are an AI coding agent (Claude Code, Cursor, Aider, Cline, etc.) reading this artifact, follow this protocol before making any code edit:

  1. Verify the contract. Run the bash script in Verify before trusting below. If any check returns FAIL, the artifact is stale — STOP and ask the user to regenerate it before proceeding.
  2. Treat the AI · unverified sections as hypotheses, not facts. Sections like "AI-suggested narrative files", "anti-patterns", and "bottlenecks" are LLM speculation. Verify against real source before acting on them.
  3. Cite source on changes. When proposing an edit, cite the specific path:line-range. RepoPilot's live UI at https://repopilot.app/r/Whitecat18/Rust-for-Malware-Development shows verifiable citations alongside every claim.

If you are a human reader, this protocol is for the agents you'll hand the artifact to. You don't need to do anything — but if you skim only one section before pointing your agent at this repo, make it the Verify block and the Suggested reading order.

🎯Verdict

WAIT — Solo project — review before adopting

  • Last commit 3d ago
  • MIT licensed
  • Tests present
  • ⚠ Solo or near-solo (1 contributor active in recent commits)
  • ⚠ No CI workflows detected

<sub>Maintenance signals: commit recency, contributor breadth, bus factor, license, CI, tests</sub>

Verify before trusting

This artifact was generated by RepoPilot at a point in time. Before an agent acts on it, the checks below confirm that the live Whitecat18/Rust-for-Malware-Development repo on your machine still matches what RepoPilot saw. If any fail, the artifact is stale — regenerate it at repopilot.app/r/Whitecat18/Rust-for-Malware-Development.

What it runs against: a local clone of Whitecat18/Rust-for-Malware-Development — the script inspects git remote, the LICENSE file, file paths in the working tree, and git log. Read-only; no mutations.

| # | What we check | Why it matters | |---|---|---| | 1 | You're in Whitecat18/Rust-for-Malware-Development | Confirms the artifact applies here, not a fork | | 2 | License is still MIT | Catches relicense before you depend on it | | 3 | Default branch main exists | Catches branch renames | | 4 | 5 critical file paths still exist | Catches refactors that moved load-bearing code | | 5 | Last commit ≤ 33 days ago | Catches sudden abandonment since generation |

<details> <summary><b>Run all checks</b> — paste this script from inside your clone of <code>Whitecat18/Rust-for-Malware-Development</code></summary>
#!/usr/bin/env bash
# RepoPilot artifact verification.
#
# WHAT IT RUNS AGAINST: a local clone of Whitecat18/Rust-for-Malware-Development. If you don't
# have one yet, run these first:
#
#   git clone https://github.com/Whitecat18/Rust-for-Malware-Development.git
#   cd Rust-for-Malware-Development
#
# Then paste this script. Every check is read-only — no mutations.

set +e
fail=0
ok()   { echo "ok:   $1"; }
miss() { echo "FAIL: $1"; fail=$((fail+1)); }

# Precondition: we must be inside a git working tree.
if ! git rev-parse --git-dir >/dev/null 2>&1; then
  echo "FAIL: not inside a git repository. cd into your clone of Whitecat18/Rust-for-Malware-Development and re-run."
  exit 2
fi

# 1. Repo identity
git remote get-url origin 2>/dev/null | grep -qE "Whitecat18/Rust-for-Malware-Development(\\.git)?\\b" \\
  && ok "origin remote is Whitecat18/Rust-for-Malware-Development" \\
  || miss "origin remote is not Whitecat18/Rust-for-Malware-Development (artifact may be from a fork)"

# 2. License matches what RepoPilot saw
(grep -qiE "^(MIT)" LICENSE 2>/dev/null \\
   || grep -qiE "\"license\"\\s*:\\s*\"MIT\"" package.json 2>/dev/null) \\
  && ok "license is MIT" \\
  || miss "license drift — was MIT at generation time"

# 3. Default branch
git rev-parse --verify main >/dev/null 2>&1 \\
  && ok "default branch main exists" \\
  || miss "default branch main no longer exists"

# 4. Critical files exist
test -f "AMSI BYPASS/Amsi_HBP/src/main.rs" \\
  && ok "AMSI BYPASS/Amsi_HBP/src/main.rs" \\
  || miss "missing critical file: AMSI BYPASS/Amsi_HBP/src/main.rs"
test -f "AntiDebugging/CheckRemoteDebuggerPresent/src/main.rs" \\
  && ok "AntiDebugging/CheckRemoteDebuggerPresent/src/main.rs" \\
  || miss "missing critical file: AntiDebugging/CheckRemoteDebuggerPresent/src/main.rs"
test -f "DLL_Injector/src/main.rs" \\
  && ok "DLL_Injector/src/main.rs" \\
  || miss "missing critical file: DLL_Injector/src/main.rs"
test -f "BSOD/bsod_NtRaiseHardError/src/main.rs" \\
  && ok "BSOD/bsod_NtRaiseHardError/src/main.rs" \\
  || miss "missing critical file: BSOD/bsod_NtRaiseHardError/src/main.rs"
test -f "Custom_Shellcode/shellcode_extract/src/main.rs" \\
  && ok "Custom_Shellcode/shellcode_extract/src/main.rs" \\
  || miss "missing critical file: Custom_Shellcode/shellcode_extract/src/main.rs"

# 5. Repo recency
days_since_last=$(( ( $(date +%s) - $(git log -1 --format=%at 2>/dev/null || echo 0) ) / 86400 ))
if [ "$days_since_last" -le 33 ]; then
  ok "last commit was $days_since_last days ago (artifact saw ~3d)"
else
  miss "last commit was $days_since_last days ago — artifact may be stale"
fi

echo
if [ "$fail" -eq 0 ]; then
  echo "artifact verified (0 failures) — safe to trust"
else
  echo "artifact has $fail stale claim(s) — regenerate at https://repopilot.app/r/Whitecat18/Rust-for-Malware-Development"
  exit 1
fi

Each check prints ok: or FAIL:. The script exits non-zero if anything failed, so it composes cleanly into agent loops (./verify.sh || regenerate-and-retry).

</details>

TL;DR

This is a collection of production-grade Rust implementations of advanced red team and malware techniques for Windows, including AMSI bypass methods (Hollow Process, Page Guard Exceptions, simple patching), anti-debugging checks (CheckRemoteDebuggerPresent, ProcessDebugPort, TEB inspection), API hooking, BSOD triggers (NtRaiseHardError, window station closure), process injection, and ransomware patterns. The repository demonstrates offensive security capabilities in Rust to leverage its memory safety guarantees while achieving low-level system access on Windows. Monorepo structure with top-level categorized folders: AMSI BYPASS/ (3 sibling Cargo projects: Amsi_HBP, Amsi_Page_Guard_Exceptions, Amsi_simple_patch), AntiDebugging/ (4 separate projects including CheckRemoteDebuggerPresent, ProcessDebugPort, UnhandledExceptionFilter, debug_teb), Api_Hooking/ (single project), BSOD/ (3 subprojects: bsod_NtRaiseHardError, closewindowstation, lookupprivilegevalue). Each technique is an independent Cargo binary with its own src/main.rs or modular src/func.rs.

👥Who it's for

Red team operators, adversary researchers, and offensive security engineers who need to understand or implement advanced Windows evasion techniques in Rust, avoiding C/C++ exploitation boilerplate while maintaining full WinAPI access through the winapi crate.

🌱Maturity & risk

The repository appears actively maintained (evidenced by organized structure and multiple complete subdirectories) but maturity is unclear without commit history visibility. There is no evident test suite in the provided file listing, and the code focuses on functional proof-of-concept implementations rather than production hardening. This is research-grade code for educational and authorized offensive security testing, not a hardened library.

This codebase carries inherent risk: all modules implement weaponized techniques (AMSI evasion, debugger detection, BSOD triggers) that are exclusively malicious in nature, with no defensive or benign use case. Dependencies are minimal but critical (winapi 0.3.9, widestring 1.2.0, thiserror 2.0.12), and the single-author structure provides no backup maintainer. No visible CI/CD pipeline, security audit, or versioning strategy mitigates technique obsolescence as Windows patches defenses.

Active areas of work

No recent activity data is visible in the provided file list, so current development status is unknown. The presence of complete README files in subdirectories (e.g., AMSI BYPASS/Amsi_HBP/README.md, AntiDebugging/README.md) suggests documentation effort, but without commit timestamps or PR visibility, ongoing work cannot be confirmed.

🚀Get running

Clone the repository and navigate to a specific technique: git clone https://github.com/Whitecat18/Rust-for-Malware-Development && cd 'AMSI BYPASS/Amsi_HBP' && cargo build --release. The project uses Cargo (Rust 2021 edition); no other build tools are required. Each subdirectory is a standalone project with its own Cargo.toml.

Daily commands: Each project builds independently via cargo build --release from its directory (e.g., AMSI BYPASS/Amsi_HBP/). Executables are placed in target/release/. No dev server or service startup; these are CLI executables that perform their evasion/bypass action on invocation. Some (e.g., BSOD techniques) must run with elevated privileges.

🗺️Map of the codebase

  • AMSI BYPASS/Amsi_HBP/src/main.rs — Core AMSI bypass using Heap-Based Patching; foundational technique for understanding anti-malware evasion patterns in the codebase.
  • AntiDebugging/CheckRemoteDebuggerPresent/src/main.rs — Anti-debugging entry point demonstrating WinAPI debugger detection; essential for understanding defensive malware patterns.
  • DLL_Injector/src/main.rs — DLL injection mechanism; core injection technique used across multiple exploitation scenarios in the repo.
  • BSOD/bsod_NtRaiseHardError/src/main.rs — Blue Screen of Death trigger implementation; demonstrates privilege escalation and system-level disruption techniques.
  • Custom_Shellcode/shellcode_extract/src/main.rs — Shellcode extraction and execution framework; critical for understanding payload delivery mechanisms.
  • Api_Hooking/src/main.rs — API hooking implementation; demonstrates runtime function interception used across multiple attack vectors.
  • Browser Creds Dumper/EdgeSavedPasswordsDumper/src/main.rs — Credential extraction from browsers; shows post-exploitation data theft patterns.

🛠️How to make changes

Add a New AMSI Bypass Technique

  1. Create new directory under AMSI BYPASS/ named after the technique (e.g., Amsi_KernelCallback) (AMSI BYPASS/)
  2. Copy Cargo.toml structure from existing bypass (e.g., Amsi_HBP/Cargo.toml) and update package name (AMSI BYPASS/Amsi_HBP/Cargo.toml)
  3. Implement the bypass logic in src/main.rs using winapi and widestring crates (AMSI BYPASS/Amsi_HBP/src/main.rs)
  4. Add README.md documenting the technique and detection evasion approach (AMSI BYPASS/Amsi_HBP/README.md)

Add a New Anti-Debugging Detection

  1. Create new subdirectory under AntiDebugging/ with descriptive name (e.g., BeingDebugged) (AntiDebugging/)
  2. Create Cargo.toml with winapi dependency and desired Windows features (AntiDebugging/CheckRemoteDebuggerPresent/Cargo.toml)
  3. Implement detection function in src/main.rs calling appropriate WinAPI functions (AntiDebugging/CheckRemoteDebuggerPresent/src/main.rs)
  4. Document the detection method and bypass countermeasures in README.md (AntiDebugging/README.md)

Add a New Code Injection Method

  1. Create new directory under DLL_Injector/ or BlockHandle/ for the injection technique (BlockHandle/remote_inject/)
  2. Set up Cargo.toml with required WinAPI features (libloaderapi, processthreadsapi, memoryapi) (BlockHandle/remote_inject/Cargo.toml)
  3. Implement core injection logic: OpenProcess → AllocVirtualMemory → WriteProcessMemory → CreateRemoteThread (BlockHandle/remote_inject/src/main.rs)
  4. Add README explaining the injection vector and privilege requirements (BlockHandle/README.md)

Add a New Shellcode Payload

  1. Write raw assembly in .asm file (e.g., Custom_Shellcode/shellcode_extract/reverse.asm format) (Custom_Shellcode/shellcode_extract/reverse.asm)
  2. Create Rust extraction tool in src/main.rs to compile ASM and convert to byte array (Custom_Shellcode/shellcode_extract/src/main.rs)
  3. Reference working example payloads for payload structure (calc_shellcode1.rs style) (Custom_Shellcode/calc_shellcode1.rs)
  4. Test execution using pattern from Custom_Shellcode/README.md documentation (Custom_Shellcode/README.md)

🔧Why these technologies

  • Rust — Memory-safe systems language with zero-cost abstractions; allows direct WinAPI calls without garbage collection overhead, critical for evasion techniques requiring precise memory manipulation and timing
  • winapi crate — Provides safe bindings to Windows API functions needed for process manipulation, memory management, and system-level operations required by all malware techniques
  • widestring crate — Handles UTF-16 wide character strings required by Windows API; essential for function names, process paths, and DLL paths in injection and hooking code
  • Custom ASM/shellcode — Raw assembly allows precise control over execution context and avoids high-level language overhead; required for undetectable payload delivery in injection and AMSI bypass scenarios

⚖️Trade-offs already made

  • Rust over C/C++

    • Why: Rust provides memory safety guarantees and easier modern syntax while still allowing unsafe{} blocks for WinAPI interop
    • Consequence: Slightly larger binary size and compilation time compared to C, but reduced memory-corruption vulnerabilities in malware code itself
  • Multiple independent technique directories rather than monolithic framework

    • Why: Allows security researchers to study and test individual techniques in isolation; reduces detection risk from pattern matching on complex malware structures
    • Consequence: Code duplication across projects (repeated WinAPI setup, memory allocation patterns), but increased modularity and deniability
  • Direct WinAPI calls via unsafe{} blocks

    • Why: Necessary for low-level system manipulation (memory patching, process injection) that cannot be safely abstracted
    • Consequence: Requires careful error handling and trust in WinAPI behavior; reduces Rust safety guarantees but essential for malware functionality
  • No obfuscation layer or packing

    • Why: Repository is educational/research-focused; obfuscation added by end-users rather than in source
    • Consequence: Compiled binaries easily detected by static/dynamic analysis; users must add their own ob

🪤Traps & gotchas

Privilege escalation required: Most BSOD and anti-debugging techniques require running with Administrator privileges; no graceful degradation. Windows version constraints: TEB structure offsets and NtQueryInformationProcess behavior vary by Windows 10/11 version; hardcoded offsets in debug_teb may break across versions. AV detection: All code is offensive in nature and will be flagged by static or behavioral scanning; no obfuscation is present, making it unsuitable for operational red team use without modification. Assembly syntax: AMSI_Page_Guard_Exceptions uses inline assembly; Rust's asm! macro syntax is stable only in 2021 edition+, and x86-64 syntax may require platform-specific testing. No error recovery: Most main.rs implementations panic or exit on WinAPI failure rather than handling gracefully.

🏗️Architecture

💡Concepts to learn

  • AMSI (Antimalware Scan Interface) — AMSI is Windows' unified antimalware scanning layer; bypassing it is the core defense-evasion mechanism in half the repo, essential for understanding how modern malware avoids detection.
  • Thread Environment Block (TEB) — The TEB is per-thread kernel memory containing debugger presence flags and process state; anti-debugging checks in this repo read TEB fields directly to avoid API hooks.
  • Inline Assembly (asm! macro) — The Amsi_Page_Guard_Exceptions module uses Rust's inline assembly to write raw x86-64 instructions for exception-driven AMSI bypass, bypassing Rust's memory safety abstractions.
  • Process Hollowing / Hollow Process — Amsi_HBP implements hollow process injection to replace a legitimate process's memory and evade parent-child relationship detection; a foundational malware persistence technique.
  • NtQueryInformationProcess (NT API) — Low-level NT syscall used by ProcessDebugPort to query kernel-level debugger state; understanding this bypasses user-mode API hooks that malware detection tools install.
  • Page Guard Exceptions — A memory paging trick used in Amsi_Page_Guard_Exceptions to trigger processor exceptions that can modify code behavior during AMSI scanning, leveraging exception handling for evasion.
  • FFI (Foreign Function Interface) to WinAPI — All techniques in this repo use Rust's FFI via the winapi crate to call undocumented and documented kernel32.dll/ntdll.dll functions; proficiency here is essential for low-level Windows exploitation.
  • m4rtinx/process-injection — Rust process injection techniques; directly complements this repo's missing Process-Injection folder mentioned in the README table of contents.
  • FSecureLABS/windows-rs — Microsoft's official Rust WinAPI bindings (windows crate) as a modern alternative to winapi; critical for understanding dependency ecosystem choices.
  • tomcarr/evasion — Python-based malware evasion techniques; provides cross-language reference implementations for validating Rust equivalents.
  • Datalux/Osintgram — Red team reconnaissance tool ecosystem; workflows in this repo (AMSI bypass → code execution → persistence) feed into post-exploitation phases.
  • outflanknl/Rbocclacx — C#-based AMSI/ETW bypass reference; gold standard for comparing Rust technique correctness against established C# malware frameworks.

🪄PR ideas

To work on one of these in Claude Code or Cursor, paste: Implement the "<title>" PR idea from CLAUDE.md, working through the checklist as the task list.

Create a centralized Windows API bindings module to reduce code duplication across AMSI_BYPASS and AntiDebugging techniques

Currently, each subdirectory (Amsi_HBP, Amsi_Page_Guard_Exceptions, CheckRemoteDebuggerPresent, ProcessDebugPort, etc.) likely duplicates Windows FFI declarations and unsafe wrapper functions. A shared src/windows_bindings/mod.rs with modules for AMSI functions, debugging detection, and BSOD techniques would reduce maintenance burden, improve consistency, and make it easier for contributors to add new techniques without reimplementing common Windows API calls.

  • [ ] Analyze AMSI_BYPASS/Amsi_HBP/src/main.rs and AMSI_BYPASS/Amsi_Page_Guard_Exceptions/src/func.rs for common FFI patterns
  • [ ] Analyze AntiDebugging/*/src/main.rs files for duplicated Windows API declarations
  • [ ] Create a new workspace-level crate windows_bindings with submodules: amsi.rs, debug.rs, bsod.rs
  • [ ] Refactor each technique directory to import from the centralized module via workspace dependency
  • [ ] Add safety documentation and examples for each Windows API wrapper

Add comprehensive integration tests for each malware technique category with expected behavior validation

The repo has no visible tests/ directory or test files. Adding integration tests for AMSI bypass techniques (verify AMSI is actually bypassed), anti-debugging (verify detector doesn't trigger), and BSOD techniques (verify preconditions and error codes) would make this a more reliable reference for red teamers and prevent regression when techniques are updated for new Windows versions.

  • [ ] Create a tests/ directory at repo root with subdirectories: amsi_tests/, antidebug_tests/, bsod_tests/
  • [ ] For AMSI_BYPASS: Add tests that invoke AmsiScanBuffer before/after bypass and log results (tests/amsi_tests/test_hbp_bypass.rs)
  • [ ] For AntiDebugging: Add tests that run detector functions and validate detection logic doesn't produce false positives (tests/antidebug_tests/test_debugger_detection.rs)
  • [ ] For BSOD: Add tests validating privilege escalation requirements and error conditions (tests/bsod_tests/test_privilege_checks.rs)
  • [ ] Document expected behavior in each test file with OS version compatibility notes

Create a GitHub Actions workflow to validate compilation across Windows target triples and document Windows SDK/MSVC requirements

The repo lacks CI/CD. No validation that code compiles on different Windows versions or with different MSVC toolchains. Adding a workflow that tests compilation on x86_64-pc-windows-msvc and x86_64-pc-windows-gnu would catch breakage early. Additionally, creating a comprehensive DEVELOPMENT.md documenting required Windows SDK versions, MSVC toolchain setup, and feature flags would reduce friction for new contributors.

  • [ ] Create .github/workflows/compile-check.yml with matrix strategy for windows-2019 and windows-2022 runners
  • [ ] Add step to verify each subdirectory Cargo.toml compiles: cargo build --release for AMSI_BYPASS/, AntiDebugging/, BSOD/*
  • [ ] Include clippy linting step with cargo clippy -- -D warnings
  • [ ] Create DEVELOPMENT.md documenting: required Windows SDK version, MSVC toolchain setup, how to run each technique safely in a VM
  • [ ] Add a matrix check for both x86_64-pc-windows-msvc and i686-pc-windows-msvc targets

🌿Good first issues

  • Add comprehensive error handling and Result returns to AMSI BYPASS/Amsi_simple_patch/src/main.rs instead of unwrap/panic; currently lacks logging for debugging bypass failures.
  • Document the specific Windows 10/11 version offsets for TEB.BeingDebugged in AntiDebugging/debug_teb/src/main.rs with version matrix (e.g., 20H2 vs. 22H2), as offsets shift and break compatibility.
  • Extend Api_Hooking/src/main.rs with both IAT and inline hooking examples with clear before/after function pointer validation, as the current code structure is unclear.

Top contributors

Click to expand

📝Recent commits

Click to expand
  • 75f2642 — EdgeSavedPasswordsDumer (Whitecat18)
  • a52f9d4 — Doom Syscall (Whitecat18)
  • cb813a4 — Bug Fix for PoC (Whitecat18)
  • 31e7633 — UnDefend PoC (Whitecat18)
  • e9f49d1 — Readme Update (Whitecat18)
  • 12d3601 — Readme Changes (Whitecat18)
  • 664d1e9 — Etw Evasion Series (Whitecat18)
  • b1dde3f — Etw Evasion series (Whitecat18)
  • c3ab6e5 — WinHTTP Code Snippets (Whitecat18)
  • 05d82d7 — Readme Update (Whitecat18)

🔒Security observations

  • Critical · Malicious Codebase - Offensive Malware Development Repository — Repository root - all modules. This repository is explicitly designed for developing malware, ransomware, and advanced red team offensive tools. The codebase contains techniques for AMSI bypass, anti-debugging, API hooking, BSOD attacks, credential theft, and other malicious capabilities. This represents a fundamental security risk as it is purpose-built for creating harmful software. Fix: Do not use, deploy, or execute any code from this repository in production environments. This codebase should only be reviewed in isolated, controlled environments for educational or defensive research purposes. Organizations should implement strict policies preventing the use of such repositories.
  • Critical · AMSI Bypass Techniques — AMSI BYPASS/ directory (all subdirectories). Multiple AMSI (Antimalware Scan Interface) bypass implementations are present, including HBP (Host-Based Protection) evasion, Page Guard Exceptions exploitation, and simple patching methods. These directly undermine Windows security mechanisms. Fix: These techniques should be reviewed only for defensive understanding. Systems should employ layered detection strategies beyond AMSI, including behavioral monitoring and endpoint protection.
  • Critical · Anti-Debugging & Evasion Techniques — AntiDebugging/ directory (all subdirectories). The AntiDebugging directory contains multiple methods to detect and evade debuggers, including CheckRemoteDebuggerPresent, ProcessDebugPort inspection, and TEB (Thread Environment Block) manipulation. These prevent forensic analysis and dynamic analysis. Fix: Deploy advanced monitoring that can detect anti-debugging behavior patterns. Use kernel-level debugging and memory inspection techniques that are harder to evade.
  • Critical · Process Injection & API Hooking — Api_Hooking/ and BlockHandle/ directories. The Api_Hooking and BlockHandle modules contain remote code injection techniques and handle manipulation for injecting malicious code into running processes. Fix: Implement memory protection mechanisms, code integrity checking, and monitor for suspicious inter-process communication and API hook installation attempts.
  • Critical · Blue Screen of Death (BSOD) Attack Vectors — BSOD/ directory (all subdirectories). Multiple BSOD attack techniques are implemented including NtRaiseHardError, window station closure, privilege escalation, and process information manipulation. These can cause system denial of service. Fix: Apply latest Windows security patches. Restrict privileged API access through AppLocker or similar policies. Monitor for suspicious calls to crash/exception APIs.
  • High · Credential Theft Capabilities — Browser Creds Dumper/ directory. The 'Browser Creds Dumper' module contains tools to extract saved passwords and credentials from Microsoft Edge and potentially other browsers, enabling credential compromise. Fix: Educate users about credential security. Implement browser security policies. Use credential guard and other OS-level credential protection mechanisms.
  • High · Unsafe Dependencies with Minimal Vetting — AMSI BYPASS/Amsi_HBP/Cargo.toml and similar files. The Cargo.toml uses external dependencies (winapi, widestring, thiserror) for Windows API access without clear verification of supply chain security. The winapi crate with libloaderapi and errhandlingapi features provides direct access to low-level Windows APIs used for injection and hooking. Fix: Verify all dependencies from trusted sources. Use dependency scanning tools. Pin dependency versions and audit for security advisories regularly.
  • High · Docker Configuration for Cross-Platform Compilation — Dockerfile. The Dockerfile builds Windows GNU executables using Rust on a Linux container. While legitimate, this infrastructure could be misused to distribute compiled malware without antivirus detection during the build process. Fix: Restrict access to build infrastructure. Implement code scanning and behavior analysis on all compiled binaries before distribution. Use signed containers.
  • High · No Code Signing or Integrity Verification — Repository root - build artifacts. There is no evidence of code signing, checksums, or integrity verification mechanisms. Binaries could be tampered with during distribution. Fix: Implement cryptographic code signing for all artifacts. Use

LLM-derived; treat as a starting point, not a security audit.


Generated by RepoPilot. Verdict based on maintenance signals — see the live page for receipts. Re-run on a new commit to refresh.