Skip to content
View 0xflux's full-sized avatar
🦊
Catching pokemon
🦊
Catching pokemon

Block or report 0xflux

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 250 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xflux/Readme.md

Come check my blog where I occasionally talk about cool things.

Pinned Loading

  1. Sanctum Sanctum Public

    Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antivirus. Built in Rust.

    Rust 369 43

  2. Wyrm Wyrm Public

    The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.

    Rust 162 19

  3. Hells-Hollow Hells-Hollow Public

    Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls

    Rust 180 24

  4. wdk-mutex wdk-mutex Public

    An idiomatic Rust mutex type for Windows kernel driver development.

    Rust 10 3

  5. Rust-Hells-Gate Rust-Hells-Gate Public

    Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust

    Rust 69 11

  6. ETW-Bypass-Rust ETW-Bypass-Rust Public

    Event Tracing for Windows EDR bypass in Rust (usermode)

    Rust 29 3