| Crates.io | Invyria |
| lib.rs | Invyria |
| version | 0.1.0 |
| created_at | 2022-05-13 20:59:30.666224+00 |
| updated_at | 2022-05-13 20:59:30.666224+00 |
| description | Invyria is an anti-reverse engineering-framework fully written in Rust. The goal of Invyria is to support Red Team Operators to evade detection from EDR solutions. |
| homepage | https://github.com/ThottySploity/invyria |
| repository | https://github.com/ThottySploity/invyria |
| max_upload_size | |
| id | 586110 |
| size | 39,074 |
Invyria is an anti-reverse engineering-framework fully written in Rust. The goal of Invyria is to support Red Team Operators to evade detection from EDR solutions.
I am not responsible for what you do with the information and code provided. This is intended for professional or educational purposes only.
Invyria was created as a project by a Cyber Security Bachelors student. The reason why I wanted to create this library was to provide an anti-reverse engineering-framework for Red Teames, to learn about anti-reverse engineering techniques and to incorporate it into my own project: https://github.com/thottysploity/mimiRust
Invyria is developed using the Rust language. The reason for this is because this language is also used in my Windwos hacking tool.