8000 GitHub - 0xsyr0/Black-Hat-Zig: This project provides some code examples of Zig for malwares, hacking, and red teaming.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

This project provides some code examples of Zig for malwares, hacking, and red teaming.

License

Notifications You must be signed in to change notification settings

0xsyr0/Black-Hat-Zig

 
 

Repository files navigation

Black-Hat-Zig

GitHub License GitHub top language GitHub repo size X (formerly Twitter) Follow


Hello hackers. Hello maldevs. Hello reversers. Nice to see you here to explore the dark power of Zig!


ToC

Intro

Important

This project is continuously updating!

This project provides many malware techniques implementation using Zig since I'm a huge fan of it. You can use this repo to weaponize Zig. Black-Hat-Zig is continuously updating to make sure it contains as more content as it could. It will be perfect if you want to create a PR for this project.

Okay, let's hack the planet!

Why Zig?

  • 🤝 Easy to interact with C/C++ source
  • 🔎 It's newer, so it's harder to be detect
  • 💪 Strongly low level control, even lower than C
  • 😱 It's harder to RE because of the modern compiler

Compiling the codes

You can check the codes inside each directory. Also, if the code uses Windows API, you will see the hint in the corresponding project directory README.md, for example, this one.

I've already set the corresponding default building target to windows-x86_64 for those needed a Windows API, so you can easily copy & paste the following command to compile the code wherever you are on Linux, Windows, even MacOS! (But you still need a Windows environment to run the executables)

zig build

Payload Placement

Techniques to place malicious payloads in various sections of an executable file.

Payload Obfuscation

Obfuscation techniques to disguise payloads and avoid detection through static analysis or pattern matching.

Payload Encryption

Various encryption schemes used to hide the real intent of a payload during storage or transmission.

Payload Execution

Reverse Shell

Primitives for establishing reverse shells for C2 access or post-exploitation control.

Malware Techniques

A collection of common offensive tradecraft techniques adapted to Zig.

Maldev Tools

Contribution

This project is currently maintained by @CX330Blake. PRs are welcomed. Hope there's more people use Zig for malware developing so the ecosystem will be more mature.

Credits & References

Star History

Star History Chart

Disclaimer

This project is for ethical and educational purpose only. Don't be a cyber criminal.

About

This project provides some code examples of Zig for malwares, hacking, and red teaming.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Zig 94.4%
  • C 5.6%
0