Skip to content
View memN0ps's full-sized avatar

Organizations

@thesecretclub

Block or report memN0ps

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
memN0ps/README.md

Over the last 5-8 years I've been quietly building security research tools as memN0ps.

The cat and mouse game between game hackers and anti-cheat engineers is the same game malware authors and detection engineers play. The knowledge has existed in underground forums for years but has been surfacing more publicly in recent years.

As a hobbyist and security researcher, I've spent the last 5-8 years releasing practical proof of concept research on GitHub to help close that gap and spread awareness. These are among the first public PoCs written entirely in Rust:

  • Eagle (2021-2022) - Windows Kernel Rootkit: process, thread, and registry hiding via DKOM, token privilege elevation to SYSTEM, kernel callback enumeration, and Driver Signature Enforcement bypass

  • RedLotus (2022-2023) - Windows UEFI Bootkit: executes before the kernel loads, hooks the boot manager to manually map an unsigned driver and bypass DSE at the firmware level

  • Matrix (2023-2024) - Windows Kernel Type-2 Hypervisor: virtualizes the running OS from a kernel driver using dual-EPT context switching, PatchGuard-compatible hidden inline hooks, hidden SSDT syscall hooks, and stealthy execution redirection via trampoline without modifying guest memory

  • Illusion (2024-2025) - Windows UEFI Type-1 Hypervisor: boots before the OS using Intel VT-x and EPT, intercepts kernel initialization at boot to install execute-only shadow pages, replays displaced instructions via Monitor Trap Flag single-stepping, and exposes a user-mode hypercall channel to toggle kernel hooks at runtime, all without touching guest memory or triggering PatchGuard

  • Armory (2026) - 115 TrustedSec BOFs ported from C to Rust: in-process situational awareness, remote operations, and injection tradecraft that execute inside the Beacon process, avoiding fork-and-run

  • DoublePulsar (2026) - Cobalt Strike UDRL: a ~65KB position-independent reflective loader with module stomping, synthetic call stack spoofing, sleep obfuscation, memory encryption, return address spoofing, IAT hooking, and heap isolation

  • Private Hyper-V Hyperjacking Framework (2023-2025) - A fully custom framework written entirely in Rust that injects into Microsoft Hyper-V at boot via a UEFI bootkit, hooks the VMEXIT handler to intercept and control guest execution, and performs arbitrary guest physical memory read/write from below the OS using EPT-backed page table manipulation, invisible to anything running in the guest

  • Private C2 Framework (2022-2026) - A fully custom Command and Control framework written entirely in Rust. The public research above represents the building blocks.

The language doesn't matter. The primitives are the same. Rust just happens to be the one I enjoy.

Research and writeups: secret.club | memn0ps.github.io

Pinned Loading

  1. illusion-rs illusion-rs Public archive

    Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)

    Rust 351 41

  2. matrix-rs matrix-rs Public archive

    Rusty Hypervisor - Windows Kernel Blue Pill Type-2 Hypervisor in Rust (Codename: Matrix)

    Rust 325 36

  3. redlotus-rs redlotus-rs Public archive

    Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)

    Rust 565 76

  4. eagle-rs eagle-rs Public archive

    Rusty Rootkit - Windows Kernel Rookit in Rust (Codename: Eagle)

    Rust 574 76

  5. doublepulsar-rs doublepulsar-rs Public archive

    Rusty DoublePulsar - Cobalt Strike User-Defined Reflective Loader (UDRL) in Rust (Codename: DoublePulsar)

    Rust 41 3

  6. armory-rs armory-rs Public archive

    Rusty Armory - Beacon Object Files (BOFs) in Rust (Codename: Armory)

    Rust 30 5