Skip to content

joaoviictorti/shadow-rs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

shadow-rs πŸ¦€

Rust Platform Forks Stars License

shadow-rs

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation while leveraging Rust’s safety and performance features. This project is intended for educational and research purposes.

The project also provides useful crates for developing rootkits, such as shadowx, which consolidates core logic and essential techniques. It includes rootkit-specific tricks, with plans for additional features in future updates.

The documentation on how to execute CLI commands can be found on the Wiki

Table of Contents

Notice

Important

This project is under development.

Features

Process Features

  • βœ… Hide and unhide processes.
  • βœ… Modify process signature levels to handle Protected Processes (PP) and Protected Process Light (PPL).
  • βœ… Protect processes against termination and memory dumping.
  • βœ… Elevate process privileges to SYSTEM, granting full administrative access.
  • βœ… Terminate target processes.
  • βœ… List all protected and hidden processes.

Thread Features

  • βœ… Hide and unhide threads.
  • βœ… Protect threads from termination or suspension.
  • βœ… List all protected and hidden threads

Driver Features

  • βœ… Hide and unhide kernel-mode drivers.
  • βœ… Enumerate all loaded drivers.
  • βœ… Enable or disable Driver Signature Enforcement (DSE) to allow loading of unsigned drivers.

Callback Features

  • βœ… List registered callbacks for process creation, thread creation, image loading, and registry operations.
  • βœ… Remove or restore specific callbacks.
  • βœ… List all removed callbacks.

Misc Features

  • βœ… Capture keystrokes from user input in real-time with kernel-level interception.
  • βœ… Disable Microsoft-Windows-Threat-Intelligence (EtwTi).

User Mode Code Execution

  • βœ… Inject shellcode or DLLs into processes using ZwCreateThreadEx.
  • βœ… Perform Asynchronous Procedure Call (APC) injection with shellcode execution in suspended threads.

Module & Registry Features

  • βœ… Hide and unhide modules from process memory listings.
  • βœ… Enumerate all loaded modules.
  • βœ… Hide and unhide registry keys and values to prevent detection and manipulation.
  • βœ… Apply registry protection to prevent key or value deletion or overwriting.

Network Features

  • βœ… Hide and unhide network ports from netstat and similar monitoring tools.

Installation

Supported Platforms

  • βœ… Windows 10 / 11 (x64 only)

Build Instructions

Driver

Navigate to the driver directory and build the kernel driver:

cargo make default --release

Important

Note: The first build must be executed as Administrator. Subsequent builds do not require elevated privileges.

To enable mapping support for tools like kdmapper, compile with:

cargo make default --release --features mapper

Client

Navigate to the client directory and build the user-mode client:

cargo build --release

For compatibility with mapped drivers:

cargo build --release --features mapper

Setup Instructions

Enable Test Mode or Test Signing Mode

bcdedit /set testsigning on

Create / Start Service

You can use Service Control Manager or OSR Driver Loader to load your driver.

Debugging

Use Windbg to attach to the kernel and monitor driver activity.

bcdedit /debug on
bcdedit /dbgsettings net hostip:<IP> port:<PORT>

Contributing to shadow-rs

To contribute to shadow-rs, follow these steps:

  1. Fork this repository.
  2. Create a branch: git checkout -b <branch_name>.
  3. Make your changes and confirm them: git commit -m '<commit_message>'.
  4. Send to the original branch: git push origin <project_name> / <local>.
  5. Create the pull request.

Alternatively, consult the GitHub documentation on how to create a pull request.

Disclaimer

This project is for educational and research purposes. Malicious use of the software is strictly prohibited and discouraged. I am not responsible for any damage caused by improper use of the software.

References

I want to express my gratitude to these projects that inspired me to create shadow-rs and contribute with some features:

Other Essential Resources:

These materials and research have been invaluable in deepening my understanding of Windows kernel development:

License

This project is licensed under the MIT License. See the LICENSE file for details.