René's URL Explorer Experiment


Title: GitHub - decoderloop/rust-malware-gallery: A collection of malware families and malware samples which use the Rust programming language.

Open Graph Title: GitHub - decoderloop/rust-malware-gallery: A collection of malware families and malware samples which use the Rust programming language.

X Title: GitHub - decoderloop/rust-malware-gallery: A collection of malware families and malware samples which use the Rust programming language.

Description: A collection of malware families and malware samples which use the Rust programming language. - decoderloop/rust-malware-gallery

Open Graph Description: A collection of malware families and malware samples which use the Rust programming language. - decoderloop/rust-malware-gallery

X Description: A collection of malware families and malware samples which use the Rust programming language. - decoderloop/rust-malware-gallery

Opengraph URL: https://github.com/decoderloop/rust-malware-gallery

X: @github

direct link

Domain: patch-diff.githubusercontent.com

route-pattern/:user_id/:repository
route-controllerfiles
route-actiondisambiguate
fetch-noncev2:6d50e6c5-41a2-fb4c-5274-ae26292de284
current-catalog-service-hashf3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb
request-idC586:246ED0:6A7D15:919242:698117EA
html-safe-noncebd4ded03fee1439fa2a6dffeb984f72bef2d462af9914a0f68b370a1df51ba43
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJDNTg2OjI0NkVEMDo2QTdEMTU6OTE5MjQyOjY5ODExN0VBIiwidmlzaXRvcl9pZCI6IjE1NzE1MTM3MzM2Njk5MDgyNiIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9
visitor-hmac75e6b41ddcc4d0e1cb1e8d38f5871fabb987cacc7bd7570dc6b348023a2d532b
hovercard-subject-tagrepository:740347610
github-keyboard-shortcutsrepository,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location//
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/decoderloop/rust-malware-gallery
twitter:imagehttps://opengraph.githubassets.com/bb1aa207dc700688eb541e1c91e20b357fb0f14ffe6c0c50b469672b6982270a/decoderloop/rust-malware-gallery
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/bb1aa207dc700688eb541e1c91e20b357fb0f14ffe6c0c50b469672b6982270a/decoderloop/rust-malware-gallery
og:image:altA collection of malware families and malware samples which use the Rust programming language. - decoderloop/rust-malware-gallery
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
hostnamegithub.com
expected-hostnamegithub.com
None39fe8101494cbb823c09b619b68c80cd4d05ab7279997038dbe06bb91608abe1
turbo-cache-controlno-preview
go-importgithub.com/decoderloop/rust-malware-gallery git https://github.com/decoderloop/rust-malware-gallery.git
octolytics-dimension-user_id212296892
octolytics-dimension-user_logindecoderloop
octolytics-dimension-repository_id740347610
octolytics-dimension-repository_nwodecoderloop/rust-malware-gallery
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forkfalse
octolytics-dimension-repository_network_root_id740347610
octolytics-dimension-repository_network_root_nwodecoderloop/rust-malware-gallery
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
released5b34a4e4898b066c629879feb4b184bc471d6a7
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fdecoderloop%2Frust-malware-gallery
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fdecoderloop%2Frust-malware-gallery
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=decoderloop%2Frust-malware-gallery
Reloadhttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery
Reloadhttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery
Reloadhttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery
decoderloop https://patch-diff.githubusercontent.com/decoderloop
rust-malware-galleryhttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fdecoderloop%2Frust-malware-gallery
Fork 10 https://patch-diff.githubusercontent.com/login?return_to=%2Fdecoderloop%2Frust-malware-gallery
Star 205 https://patch-diff.githubusercontent.com/login?return_to=%2Fdecoderloop%2Frust-malware-gallery
205 stars https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/stargazers
10 forks https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/forks
Branches https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/branches
Tags https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/tags
Activity https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/activity
Star https://patch-diff.githubusercontent.com/login?return_to=%2Fdecoderloop%2Frust-malware-gallery
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fdecoderloop%2Frust-malware-gallery
Code https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery
Issues 0 https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/issues
Pull requests 0 https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/pulls
Discussions https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/discussions
Actions https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/actions
Security 0 https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/security
Insights https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/pulse
Code https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery
Issues https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/issues
Pull requests https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/pulls
Discussions https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/discussions
Actions https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/actions
Security https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/security
Insights https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/pulse
Brancheshttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/branches
Tagshttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/tags
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/branches
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/tags
36 Commitshttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/commits/main/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/commits/main/
Katsushika-Hokusai-Crab-and-Flowers-resize-border.jpghttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/blob/main/Katsushika-Hokusai-Crab-and-Flowers-resize-border.jpg
Katsushika-Hokusai-Crab-and-Flowers-resize-border.jpghttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/blob/main/Katsushika-Hokusai-Crab-and-Flowers-resize-border.jpg
README.mdhttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/blob/main/README.md
README.mdhttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/blob/main/README.md
READMEhttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#-rust-malware-sample-gallery
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/blob/main/Katsushika-Hokusai-Crab-and-Flowers-resize-border.jpg
Hokusai - Crab and Flowershttps://harvardartmuseums.org/collections/object/100101
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#about
Malware Bazaarhttps://bazaar.abuse.ch
MalSharehttps://malshare.com/
Decoder Loophttps://decoderloop.com
this GitHub repositoryhttps://github.com/decoderloop/rust-malware-gallery/pulls
Contacthttps://decoderloop.com/contact/
decoderloop.comhttps://decoderloop.com
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#01flip
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups
2025-12-10 - Palo Alto Networks - 01flip: Multi-Platform Ransomware Written in Rusthttps://unit42.paloaltonetworks.com/new-ransomware-01flip-written-in-rust/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples
MalwareBazaarhttps://bazaar.abuse.ch/sample/e5834b7bdd70ec904470d541713e38fe933e96a4e49f80dbfb25148d9674f957/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#agenda-ransomware
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#aliases
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-1
2022-12-16 - Trend Micro - Agenda Ransomware Uses Rust to Target More Vital Industrieshttps://www.trendmicro.com/en_us/research/22/l/agenda-ransomware-uses-rust-to-target-more-vital-industries.html
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia
win.agendacrypthttps://malpedia.caad.fkie.fraunhofer.de/details/win.agendacrypt
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-1
MalwareBazaarhttps://bazaar.abuse.ch/sample/e90bdaaf5f9ca900133b699f18e4062562148169b29cb4eb37a0577388c22527/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#akira-ransomware-rust-akira-v2-variant
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-2
2024-10-21 - Cisco - Akira ransomware continues to evolvehttps://blog.talosintelligence.com/akira-ransomware-continues-to-evolve/
2024-12-03 - Check Point - Inside Akira Ransomware's Rust Experimenthttps://research.checkpoint.com/2024/inside-akira-ransomwares-rust-experiment/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-1
elf.akirahttps://malpedia.caad.fkie.fraunhofer.de/details/elf.akira
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-2
MalwareBazaarhttps://bazaar.abuse.ch/sample/0ee1d284ed663073872012c7bde7fac5ca1121403f1a5d2d5411317df282796c/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#akira-ransomware-rust-megazord-variant
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-3
2024-10-21 - Cisco - Akira ransomware continues to evolvehttps://blog.talosintelligence.com/akira-ransomware-continues-to-evolve/
2024-12-02 - Palo Alto - Threat Assessment: Howling Scorpius (Akira Ransomware)https://unit42.paloaltonetworks.com/threat-assessment-howling-scorpius-akira-ransomware/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-2
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-3
MalwareBazaarhttps://bazaar.abuse.ch/sample/28cea00267fa30fb63e80a3c3b193bd9cd2a3d46dd9ae6cede5f932ac15c7e2e/
MalwareBazaarhttps://bazaar.abuse.ch/sample/131da83b521f610819141d5c740313ce46578374abb22ef504a7593955a65f07/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#asyncrat-rust-variant
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-4
2025-05-26 - G DATA - Reborn in Rust: AsyncRAThttps://www.gdatasoftware.com/blog/2025/05/38207-asyncrat-rust
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-4
MalwareBazaarhttps://bazaar.abuse.ch/sample/eb12c198fc1b6ec79ea4b457988db4478ee6bc9aca128aa24a85b76a57add459/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#notes
https://github.com/pathetic/async-rust-rat/https://github.com/pathetic/async-rust-rat/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#banshee-rust-variant
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-5
2025-01-31 - Kandji - Banshee Rust Rewrite?https://the-sequence.com/banshee-rust-rewrite
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-5
MalwareBazaarhttps://bazaar.abuse.ch/sample/dea72cdd7c9dfc49f0a19581086c8e6e99b000dc33f461ece8b9f37c1bd7068d/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#blackcat-ransomware
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#aliases-1
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-6
2022-01-26 - Varonis - BlackCat Ransomware (ALPHV)https://www.varonis.com/blog/blackcat-ransomware
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-3
win.blackcathttps://malpedia.caad.fkie.fraunhofer.de/details/win.blackcat
elf.blackcathttps://malpedia.caad.fkie.fraunhofer.de/details/elf.blackcat
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-6
MalwareBazaarhttps://bazaar.abuse.ch/sample/3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#blackcat-ransomware-sphynx
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#aliases-2
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-7
2023-05-30 - IBM X-Force - BlackCat (ALPHV) ransomware levels up for stealth, speed and exfiltrationhttps://securityintelligence.com/x-force/blackcat-ransomware-levels-up-stealth-speed-exfiltration/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-4
win.blackcathttps://malpedia.caad.fkie.fraunhofer.de/details/win.blackcat
elf.blackcathttps://malpedia.caad.fkie.fraunhofer.de/details/elf.blackcat
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-7
MalwareBazaarhttps://bazaar.abuse.ch/sample/c0e70e69d8f7432383fa37528cd42db764b73dd08eb75d72229c2a0d02e538cc/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#cargobay
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-8
2022-11-29 - IBM X-Force - CargoBay BlackHat Backdoor Analysis Report (IRIS-14738)https://exchange.xforce.ibmcloud.com/malware-analysis/guid:87abff769352d8208e403331c86eb95f
1https://patch-diff.githubusercontent.com/twitter.com/BushidoToken/status/1626538453989990402
2https://twitter.com/BushidoToken/status/1626538456859004928
3https://twitter.com/BushidoToken/status/1626538458427670529
4https://twitter.com/BushidoToken/status/1626538460243808256
5https://twitter.com/BushidoToken/status/1626538461908897793
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-5
win.cargobayhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cargobay
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-8
MalwareBazaarhttps://bazaar.abuse.ch/sample/a963a8a8e1583081daa43638744eef6c410d1a410c11eb9413da15a26e802de5/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#notes-1
https://github.com/skerkour/black-hat-rusthttps://github.com/skerkour/black-hat-rust
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#chaosbot
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-9
2025-10-09 - eSentire - New Rust Malware "ChaosBot" Uses Discord for Command and Controlhttps://www.esentire.com/blog/new-rust-malware-chaosbot-uses-discord-for-command-and-control
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-9
MalwareBazaarhttps://bazaar.abuse.ch/sample/4d5f3690cdff840ceba70c1b1630ceadd0d3dcf23c8e0add0257cba2f166f5e6/
MalwareBazaarhttps://bazaar.abuse.ch/sample/cdc73afb92617d9e2e0b6f2f22587f5f57316250a25b7bb8477a80628703e7b7/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#cicada3301-ransomware
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-10
2024-08-30 - TrueSec - Dissecting the Cicadahttps://www.truesec.com/hub/blog/dissecting-the-cicada
2024-09-03 - MorphiSec - Cicada3301 Ransomware (archived version)https://cyberscoop.com/wp-content/uploads/sites/3/2024/08/20240829-morphisec-cicada3301-ransomware-final__doc.pdf
2024-10-18 - Group-IB - Encrypted Symphony: Infiltrating the Cicada3301 Ransomware-as-a-Service Grouphttps://www.group-ib.com/blog/cicada3301/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-10
MalwareBazaarhttps://bazaar.abuse.ch/sample/7b3022437b637c44f42741a92c7f7ed251845fd02dda642c0a47fde179bd984e/
MalwareBazaarhttps://bazaar.abuse.ch/sample/56e1d092c07322d9dad7d85d773953573cc3294b9e428b3bbbaf935ca4d2f7e7/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#convuster
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-11
2021-03-18 - Kaspersky - Convuster: macOS adware now in Rusthttps://securelist.com/convuster-macos-adware-in-rust/101258/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-6
osx.convusterhttps://malpedia.caad.fkie.fraunhofer.de/details/osx.convuster
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-11
MalSharehttps://malshare.com/sample.php?action=detail&hash=947ae8f075fd0d1e5be0341b922c0173f0c5cfd771314ebe220207f3ed53466a
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#notes-2
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#cosmicrust
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-12
2024-01-04 - Greg Lesnewich - 100DaysofYARA - CosmicRusthttps://g-les.github.io/yara/2024/01/04/100DaysofYARA-CosmicRust.html
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-12
MalSharehttps://malshare.com/sample.php?action=detail&hash=3315e5a4590e430550a4d85d0caf5f521d421a2966b23416fcfc275a5fd2629a
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#deltastealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-13
2023-05-19 - Trend Micro - Rust-Based Info Stealers Abuse GitHub Codespaceshttps://www.trendmicro.com/en_us/research/23/e/rust-based-info-stealers-abuse-github-codespaces.html
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-7
win.deltastealerhttps://malpedia.caad.fkie.fraunhofer.de/details/win.deltastealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-13
MalwareBazaarhttps://bazaar.abuse.ch/sample/c92a7425959121ff49970c53b78e714b9e450e4b214ac85deb878d0bedf82a70/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#eddiestealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-14
2025-05-29 - Elastic - Chasing Eddies: New Rust- based InfoStealer used in CAPTCHA campaignshttps://www.elastic.co/security-labs/eddiestealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-14
MalwareBazaarhttps://bazaar.abuse.ch/sample/5330cf6a8f4f297b9726f37f47cffac38070560cbac37a8e561e00c19e995f42/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#embargo-ransomware
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-15
2024-05-24 - Cyble - The Rust Revolution: New Embargo Ransomware Steps Inhttps://cyble.com/blog/the-rust-revolution-new-embargo-ransomware-steps-in/
2024-10-23 - ESET - Embargo ransomware: Rock'n'Rusthttps://www.welivesecurity.com/en/eset-research/embargo-ransomware-rocknrust/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-15
MalwareBazaarhttps://bazaar.abuse.ch/sample/ebffc9ced2dba66db9aae02c7ccd2759a36c5167df5cd4adb151b20e7eab173c/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#evm-units
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-16
2025-12-02 - Socket - Malicious Rust Crate evm-units Serves Cross-Platform Payloads for Silent Executionhttps://socket.dev/blog/malicious-rust-crate-evm-units-serves-cross-platform-payloads
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-16
Socket.dev package archivehttps://socket.dev/cargo/package/evm-units/files/1.3.0/evm-units-1.3.0/src/lib.rs#L210
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#exewho2
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-17
2023-12-04 - Alex Perotti - ExeWho2 - A Tool from the Wildhttps://cyb3rkitties.github.io/posts/exewho2-download-execution-payload-red-teaming/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-17
MalwareBazaarhttps://bazaar.abuse.ch/sample/a36967a40dcff74c04b5dd80f1aa685925912df8ff6cb63c14059439e08d5f8d/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#notes-3
https://github.com/cyb3rkitties/exewho2https://github.com/cyb3rkitties/exewho2
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#fickerstealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-18
2020-10-27 - 3xp0rtblog - Tweet on FickerStealerhttps://twitter.com/3xp0rtblog/status/1321209656774135810
2021-07-19 - CyberArk - FickerStealer: A New Rust Player in the Markethttps://www.cyberark.com/resources/threat-research-blog/fickerstealer-a-new-rust-player-in-the-market
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-8
win.fickerstealerhttps://malpedia.caad.fkie.fraunhofer.de/details/win.fickerstealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-18
MalwareBazaarhttps://bazaar.abuse.ch/sample/dc021a0ca0bb3f66d54d15d2b236422c0b90399ea762c7d7aa6d727b9bd5b46c/
FickerStealer signature on Malware Bazaarhttps://bazaar.abuse.ch/browse/signature/FickerStealer/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#fickle-stealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-19
2024-06-19 - Fortinet - Fickle Stealer Distributed via Multiple Attack Chainhttps://www.fortinet.com/blog/threat-research/fickle-stealer-distributed-via-multiple-attack-chain
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-19
MalwareBazaarhttps://bazaar.abuse.ch/sample/e9bc44cf548a70e7285499209973faf44b7374dece1413dfcdc03bf25a6c599c/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#freezers
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-20
2023-08-09 - Fortinet - Attackers Distribute Malware via Freeze.rs And SYK Crypterhttps://www.fortinet.com/blog/threat-research/malware-distributed-via-freezers-and-syk-crypter
2023-09-07 - Gi7w0rm - Uncovering DDGroup — A long-time threat actorhttps://gi7w0rm.medium.com/uncovering-ddgroup-a-long-time-threat-actor-d3b3020625a4
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-20
MalSharehttps://malshare.com/sample.php?action=detail&hash=afd38445e5249ac5ac66addd18c20d271f41c3ffb056ca49c8c02f9fecb4afcb
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#notes-4
https://github.com/optiv/Freeze.rshttps://github.com/optiv/Freeze.rs
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#funksec-ransomware
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#aliases-3
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-21
2025-01-10 - Check Point - FunkSec – Alleged Top Ransomware Group Powered by AIhttps://research.checkpoint.com/2025/funksec-alleged-top-ransomware-group-powered-by-ai/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-21
MalwareBazaarhttps://bazaar.abuse.ch/sample/c233aec7917cf34294c19dd60ff79a6e0fac5ed6f0cb57af98013c08201a7a1c
MalwareBazaarhttps://bazaar.abuse.ch/sample/66dbf939c00b09d8d22c692864b68c4a602e7a59c4b925b2e2bef57b1ad047bd
MalwareBazaarhttps://bazaar.abuse.ch/sample/dcf536edd67a98868759f4e72bcbd1f4404c70048a2a3257e77d8af06cb036ac
MalwareBazaarhttps://bazaar.abuse.ch/sample/b1ef7b267d887e34bf0242a94b38e7dc9fd5e6f8b2c5c440ce4ec98cc74642fb
MalwareBazaarhttps://bazaar.abuse.ch/sample/5226ea8e0f516565ba825a1bbed10020982c16414750237068b602c5b4ac6abd
MalwareBazaarhttps://bazaar.abuse.ch/sample/e622f3b743c7fc0a011b07a2e656aa2b5e50a4876721bcf1f405d582ca4cda22
MalwareBazaarhttps://bazaar.abuse.ch/sample/20ed21bfdb7aa970b12e7368eba8e26a711752f1cc5416b6fd6629d0e2a44e5d
MalwareBazaarhttps://bazaar.abuse.ch/sample/dd15ce869aa79884753e3baad19b0437075202be86268b84f3ec2303e1ecd966
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#notes-5
MalwareBazaarhttps://bazaar.abuse.ch/sample/7e223a685d5324491bcacf3127869f9f3ec5d5100c5e7cb5af45a227e6ab4603/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rust-based-payload-delivered-by-glassworm
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-22
2025-11-29 - Nextron Systems - Analysis of the Rust implants found in the malicious VS Code extensionhttps://www.nextron-systems.com/2025/11/29/analysis-of-the-rust-implants-found-in-the-malicious-vs-code-extension/
2025-12-10 - Koi - GlassWorm Goes Native: Same Infrastructure, Hardened Deliveryhttps://www.koi.ai/blog/glassworm-goes-native-same-infrastructure-hardened-delivery
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-22
MalwareBazaarhttps://bazaar.abuse.ch/sample/6ebeb188f3cc3b647c4460c0b8e41b75d057747c662f4cd7912d77deaccfd2f2/
MalwareBazaarhttps://bazaar.abuse.ch/sample/fb07743d139f72fca4616b01308f1f705f02fda72988027bc68e9316655eadda/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#hive-ransomware-rust-variant
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-23
2022-07-05 - Microsoft - Hive ransomware gets upgrades in Rusthttps://www.microsoft.com/en-us/security/blog/2022/07/05/hive-ransomware-gets-upgrades-in-rust/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-9
win.hivehttps://malpedia.caad.fkie.fraunhofer.de/details/win.hive
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-23
MalwareBazaarhttps://bazaar.abuse.ch/sample/f4a39820dbff47fa1b68f83f575bc98ed33858b02341c5c0464a49be4e6c76d3/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#hunters-international-ransomware
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-24
2023-11-09 - Bitdefender - Hive Ransomware's Offspring: Hunters International Takes the Stagehttps://www.bitdefender.com.au/blog/businessinsights/hive-ransomwares-offspring-hunters-international-takes-the-stage/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-24
MalwareBazaarhttps://bazaar.abuse.ch/sample/c4d39db132b92514085fe269db90511484b7abe4620286f6b0a30aa475f64c3e/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#jlorat
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-25
2023-04-34 - Kaspersky - Tomiris called, they want their Turla malware back > Tomiris's polyglot toolset > JLORAThttps://securelist.com/tomiris-called-they-want-their-turla-malware-back/109552/#jlorat
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-10
win.jlorathttps://malpedia.caad.fkie.fraunhofer.de/details/win.jlorat
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-25
MalwareBazaarhttps://bazaar.abuse.ch/sample/69bb729ff354cd9651f99a05f74f3ea20d483dc8e6e5838e4dd48858fd500d29/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#kcvy-oslock
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-26
Tweet regarding KCVY OSLOCK Ransomware (archived version)https://archive.is/IVFKD
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-26
MalwareBazaarhttps://bazaar.abuse.ch/sample/0ae6570d9e659ffd5efc1e3f9faca696bd12b66b8d125b1159aee9e5251a4d79/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#krustyloader
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-27
2024-01-29 - Synacktiv - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromiseshttps://www.synacktiv.com/publications/krustyloader-rust-malware-linked-to-ivanti-connectsecure-compromises
2024-02-10 - N0fix - KrustyLoader - About stripped Rust symbol recovery (archived version)https://archive.is/YXkYt
2024-08-03 - N0fix - KrustyLoader - Leveraging rust compilation artifacts to obtain reliable compilation timestamps and pivoting (archived version)https://archive.is/6WGRv
2025-05-13 - EclecticIQ - China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructureshttps://blog.eclecticiq.com/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-11
elf.krustyloaderhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.krustyloader
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-27
MalwareBazaarhttps://bazaar.abuse.ch/sample/030eb56e155fb01d7b190866aaa8b3128f935afd0b7a7b2178dc8e2eb84228b0/
MalwareBazaarhttps://bazaar.abuse.ch/sample/47ff0ae9220a09bfad2a2fb1e2fa2c8ffe5e9cb0466646e2a940ac2e0cf55d04/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#luca-stealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-28
2022-08-18 - BlackBerry - Luca Stealer Targets Password Managers and Cryptocurrency Walletshttps://blogs.blackberry.com/en/2022/08/luca-stealer-targets-password-managers-and-cryptocurrency-wallets
Binary Defense - Digging through Rust to find Gold: Extracting Secrets from Rust Malwarehttps://www.binarydefense.com/resources/blog/digging-through-rust-to-find-gold-extracting-secrets-from-rust-malware/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-12
win.lucastealerhttps://malpedia.caad.fkie.fraunhofer.de/details/win.luca_stealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-28
MalSharehttps://malshare.com/sample.php?action=detail&hash=99331a27afa84009e140880a8739d96f97baa1676d67ba7a3278fe61bfb79022
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#notes-6
https://web.archive.org/web/20220725203750/https://github.com/luca364/rust-stealer/archive/refs/heads/master.ziphttps://web.archive.org/web/20220725203750/https://github.com/luca364/rust-stealer/archive/refs/heads/master.zip
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#luna-ransomware
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-29
2022-08-30 - Elastic - LUNA Ransomware Attack Pattern Analysishttps://www.elastic.co/security-labs/luna-ransomware-attack-pattern
2023-01-13 - Nikhil "Kaido" Hegde - Getting Rusty and Stringy with Luna Ransomwarehttps://nikhilh-20.github.io/blog/luna_ransomware/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-13
elf.lunahttps://malpedia.caad.fkie.fraunhofer.de/details/elf.luna
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-29
MalSharehttps://malshare.com/sample.php?action=detail&hash=1cbbf108f44c8f4babde546d26425ca5340dccf878d306b90eb0fbec2f83ab51
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#myth-stealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-30
2025-06-05 - Trellix - Demystifying Myth Stealer: A Rust Based InfoStealerhttps://www.trellix.com/blogs/research/demystifying-myth-stealer-a-rust-based-infostealer/
2025-08-17 - cxiao.net - Reversing a (not-so-) Simple Rust Loaderhttps://cxiao.net/posts/2025-08-17-not-so-simple-rust-loader/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-30
MalwareBazaarhttps://bazaar.abuse.ch/sample/55a418f8562684607ee0acd745595e297ab7e586d0a5d3f8328643b29c72dfa2/
MalwareBazaarhttps://bazaar.abuse.ch/sample/2f2b93d37d67b80b4faaf25bebe4e3cbaf7aca35328aeb66da6a1a9b44316f5b/
MalwareBazaarhttps://bazaar.abuse.ch/sample/66054607f38481ee7e39e002b58fe950966c4c0203df39f46acfe5c0e857c89a/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#nokoyawa-ransomware-rust-variant
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-31
2022-12-20 - Zscaler - Nokoyawa Ransomware: Rust or Busthttps://www.zscaler.com/blogs/security-research/nokoyawa-ransomware-rust-or-bust
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-14
win.nokoyawahttps://malpedia.caad.fkie.fraunhofer.de/details/win.nokoyawa
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-31
MalwareBazaarhttps://bazaar.abuse.ch/sample/7095beafff5837070a89407c1bf3c6acf8221ed786e0697f6c578d4c3de0efd6/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#p2pinfect
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-32
2023-07-19 - Palo Alto Networks - P2PInfect: The Rusty Peer-to-Peer Self-Replicating Wormhttps://unit42.paloaltonetworks.com/peer-to-peer-worm-p2pinfect/
2023-07-31 - Cado Security - Cado Security Labs Encounter Novel Malware, Redis P2Pinfect (archived version)https://web.archive.org/web/20250527051235/https://www.cadosecurity.com/blog/redis-p2pinfect
2023-09-20 - Cado Security - Cado Security Labs Researchers Witness a 600X Increase in P2Pinfect Traffic (archived version)https://web.archive.org/web/20250812081523/https://www.cadosecurity.com/blog/cado-security-labs-researchers-witness-a-600x-increase-in-p2pinfect-traffic
2023-12-04 - Cado Security - P2Pinfect - New Variant Targets MIPS Devices (archived version)https://web.archive.org/web/20250702212318/https://www.cadosecurity.com/blog/p2pinfect-new-variant-targets-mips-devices
2024-01-16 - Nozomi Networks - P2PInfect Worm Evolves to Target a New Platformhttps://www.nozominetworks.com/blog/p2pinfect-worm-evolves-to-target-a-new-platform
2024-06-25 - Cado Security - From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer (archived version)https://web.archive.org/web/20250812064127/https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-15
elf.p2pinfecthttps://malpedia.caad.fkie.fraunhofer.de/details/elf.p2pinfect
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-32
MalwareBazaarhttps://bazaar.abuse.ch/sample/3a43116d507d58f3c9717f2cb0a3d06d0c5a7dc29f601e9c2b976ee6d9c8713f/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#notes-7
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#ralord-ransomware
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-33
2025-04 - ISH Tecnologia - RALord: Novo grupo de Ransomware-as-a-Servicehttps://ish.com.br/wp-content/uploads/2025/04/RALord-Novo-grupo-de-Ransomware-as-a-Service-1.pdf
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-33
MalwareBazaarhttps://bazaar.abuse.ch/sample/456b9adaabae9f3dce2207aa71410987f0a571cd8c11f2e7b41468501a863606/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#ransomexx2
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#aliases-4
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-34
2022-11-22 - IBM X-Force - RansomExx upgrades to rusthttps://securityintelligence.com/x-force/ransomexx-upgrades-rust/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-16
elf.ransomexxhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.ransomexx
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-34
MalSharehttps://malshare.com/sample.php?action=detail&hash=a7ea1e33c548182b8e56e32b547afb4b384ebe257ca0672dbf72569a54408c5c
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#realst-stealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-35
2023-07-06 - Iamdeadlyz - Fake Blockchain Games Deliver RedLine Stealer & Realst Stealer - A New macOS Infostealer Malwarehttps://iamdeadlyz.gitbook.io/malware-research/july-2023/fake-blockchain-games-deliver-redline-stealer-and-realst-stealer-a-new-macos-infostealer-malware#realst-stealer-macos
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-35
MalwareBazaarhttps://bazaar.abuse.ch/sample/2af0e212ad70eaf8b96a645045ef2764700b5adf7b1187ae3d82240f96f613e2/
RealstStealer tag on Malware Bazaarhttps://bazaar.abuse.ch/browse/tag/RealstStealer/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rust-based-loader-for-rilide
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#aliases-5
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-36
2023-04-04 - Trustwave - Rilide: A New Malicious Browser Extension for Stealing Cryptocurrencieshttps://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/rilide-a-new-malicious-browser-extension-for-stealing-cryptocurrencies/
2023-05-01 - Mandiant - A LNK Between Browsers: Hunting Methodologies and Extension Abusing Actorshttps://www.mandiant.com/resources/blog/lnk-between-browsers
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-36
MalwareBazaarhttps://bazaar.abuse.ch/sample/0f11aeecbde1f355d26c9d406dad80cb0ae8536aea31fdddaf915d4afd434f3f/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rust-based-stealer-used-in-rusticweb-campaign
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-37
2023-12-21 - Seqrite - Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltrationhttps://www.seqrite.com/blog/operation-rusticweb-targets-indian-govt-from-rust-based-malware-to-web-service-exfiltration/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-17
win.unidentified_112https://malpedia.caad.fkie.fraunhofer.de/details/win.unidentified_112
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-37
MalSharehttps://malshare.com/sample.php?action=detail&hash=db91e23d9715464511057f2e15c9adc97d3f27fcfa308f05ac7e2de7275fdd32
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rustbucket
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-38
2023-04-21 - Jamf - BlueNoroff APT group targets macOS with ‘RustBucket’ Malwarehttps://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/
2023-07-13 - Elastic - The DPRK strikes using a new variant of RUSTBUCKEThttps://www.elastic.co/security-labs/DPRK-strikes-using-a-new-variant-of-rustbucket
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-18
osx.rustbuckethttps://malpedia.caad.fkie.fraunhofer.de/details/osx.rustbucket
win.rustbuckethttps://malpedia.caad.fkie.fraunhofer.de/details/win.rustbucket
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-38
MalSharehttps://malshare.com/sample.php?action=detail&hash=9ca914b1cfa8c0ba021b9e00bda71f36cad132f27cf16bda6d937badee66c747
MalwareBazaarhttps://bazaar.abuse.ch/sample/de81e5246978775a45f3dbda43e2716aaa1b1c4399fe7d44f918fccecc4dd500/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rustdoor
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#aliases-6
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-39
2024-02-08 - Bitdefender - New macOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Grouphttps://www.bitdefender.com/en-us/blog/labs/new-macos-backdoor-written-in-rust-shows-possible-link-with-windows-ransomware-group
2024-02-19 - S2W - RustDoor and GateDoor: A New Pair of Weapons Disguised as Legitimate Software by Suspected Cybercriminalhttps://medium.com/s2wblog/rustdoor-and-gatedoor-a-new-pair-of-weapons-disguised-as-legitimate-software-by-suspected-34c94e558b40
2024-09-16 - Jamf - Jamf Threat Labs observes targeted attacks amid FBI Warningshttps://www.jamf.com/blog/jamf-threat-labs-observes-targeted-attacks-amid-fbi-warnings/
2025-02-26 - Palo Alto Networks - RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sectorhttps://unit42.paloaltonetworks.com/macos-malware-targets-crypto-sector/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-39
MalwareBazaarhttps://bazaar.abuse.ch/sample/a900ec81363358ef26bcdf7827f6091af44c3f1001bc8f52b766c9569b56faa5/
MalwareBazaarhttps://bazaar.abuse.ch/sample/4a59e2fe11ed9136d96a985448b34957ee5861adc9c1a52de4ad65880875dfdb/
MalwareBazaarhttps://bazaar.abuse.ch/sample/238b546e2a1afc230f88b98dce1be6bf442b0b807e364106c0b28fe18db2ce66/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rustic-crypter
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-40
2022-05-19 - IBM X-Force - ITG23 crypters highlight cooperation between cyber criminal groupshttps://securityintelligence.com/posts/itg23-crypters-cooperation-between-cybercriminal-groups/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-40
MalwareBazaarhttps://bazaar.abuse.ch/sample/45aa8efb6b1a9a0e0091040bb99a7c37d346aaf306fa4e31e9d5d9f0fef56676/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rustobot
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-41
2025-04-21 - Fortinet - New Rust Botnet "RustoBot" is Routed via Routershttps://www.fortinet.com/blog/threat-research/new-rust-botnet-rustobot-is-routed-via-routers
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-41
MalwareBazaarhttps://bazaar.abuse.ch/sample/114b460012412411363c9a3ab0246e48a584ce86fc6c0b7855495ec531dd05a1/
MalwareBazaarhttps://bazaar.abuse.ch/sample/1697fd5230f7f09a7b43fee1a1693013ed98beeb7a182cd3f0393d93dd1b7576/
MalwareBazaarhttps://bazaar.abuse.ch/sample/44a526f20c592fd95b4f7d61974c6f87701e33776b68a5d0b44ccd2fa3f48c5d/
MalwareBazaarhttps://bazaar.abuse.ch/sample/5dc90cbb0f69f283ccf52a2a79b3dfe94ee8b3474cf6474cfcbe9f66f245a55d/
MalwareBazaarhttps://bazaar.abuse.ch/sample/9a9b5bdeb1f23736ceffba623c8950d627a791a0b40c4d44ae2f80e02a43955d/
MalwareBazaarhttps://bazaar.abuse.ch/sample/9e660ce74e1bdb0a75293758200b03efd5f807e7896665addb684e0ffb53afd2/
MalwareBazaarhttps://bazaar.abuse.ch/sample/9f098920613bd0390d6485936256a67ae310b633124cfbf503936904e69a81bf/
MalwareBazaarhttps://bazaar.abuse.ch/sample/b68e2d852ad157fc01da34e11aa24a5ab30845b706d7827b8119a3e648ce2cf1/
MalwareBazaarhttps://bazaar.abuse.ch/sample/b910e77ee686d7d6769fab8cb8f9b17a4609c4e164bb4ed80d9717d9ddad364f/
MalwareBazaarhttps://bazaar.abuse.ch/sample/c0abb19b3a72bd2785e8b567e82300423da672a463eefdeda6dd60872ff0e072/
MalwareBazaarhttps://bazaar.abuse.ch/sample/e547306d6dee4b5b2b6ce3e989b9713a5c21ebe3fefa0f5c1a1ea37cec37e20f/
MalwareBazaarhttps://bazaar.abuse.ch/sample/ec9e77f1185f644462305184cf8afcf5d12c7eb524a2d3f4090a658a198c20ce/
MalwareBazaarhttps://bazaar.abuse.ch/sample/efb0153047b08aa1876e1e4e97a082f6cb05af75479e1e9069b77d98473a11f4/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rustonotto
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#aliases-7
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-42
2025-08-07 - S2W - ScarCruft's New Language: Whispering in PubNub, Crafting Backdoor in Rust, Striking with Ransomwarehttps://github.com/S2W-TALON/Threat-Intelligence-Report/blob/df953af93d3634885bbfc5a0a2f2e1b2aeef58c1/250807_ScarCruft's%20New%20Language%3A%20Whispering%20in%20PubNub%2C%20Crafting%20Backdoor%20in%20Rust%2C%20Striking%20with%20Ransomware/%5BS2W%5D%20ScarCruft%E2%80%99s%20New%20Language_%20Whispering%20in%20PubNub%2C%20Crafting%20Backdoor%20in%20Rust%2C%20Striking%20with%20Ransomware.pdf
2025-09-08 - Zscaler - APT37 Targets Windows with Rust Backdoor and Python Loaderhttps://www.zscaler.com/blogs/security-research/apt37-targets-windows-rust-backdoor-and-python-loader
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-19
win.rustonottohttps://malpedia.caad.fkie.fraunhofer.de/details/win.rustonotto
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-42
MalwareBazaarhttps://bazaar.abuse.ch/sample/67ad959e8af25a48928c28ca9a38a6f2a61ea4935fe60dfed79061214e840b15/
MalwareBazaarhttps://bazaar.abuse.ch/sample/738a31e7a0d96fe1b0ad6778db39425160835a80ac33ce8a84f26b71c00c26b9/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rustyattr
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-43
2024-11-13 - Group-IB - Stealthy Attributes of Lazarus APT Group: Evading Detection with Extended Attributeshttps://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-43
MalwareBazaarhttps://bazaar.abuse.ch/sample/9111d458d5665b1bf463859792e950fe8d8186df9a6a3241360dc11f34d018c2
MalwareBazaarhttps://bazaar.abuse.ch/sample/176e8a5a7b6737f8d3464c18a77deef778ec2b9b42b7e7eafc888aeaf2758c2d
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rustybuer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-44
2021-05-03 - Proofpoint - New Variant of Buer Loader Written in Rusthttps://www.proofpoint.com/us/blog/threat-insight/new-variant-buer-loader-written-rust
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-20
win.buerhttps://malpedia.caad.fkie.fraunhofer.de/details/win.buer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-44
MalwareBazaarhttps://bazaar.abuse.ch/sample/3abed86f46c8be754239f8c878f035efaae91c33b8eb8818c5bbed98c4d9a3ac/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rustyclaw
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-45
2024-10-17 - Cisco - UAT-5647 targets Ukrainian and Polish entities with RomCom malware variantshttps://blog.talosintelligence.com/uat-5647-romcom/
2025-06-30 - Proofpoint - 10 Things I Hate About Attribution: RomCom vs. TransferLoaderhttps://www.proofpoint.com/us/blog/threat-insight/10-things-i-hate-about-attribution-romcom-vs-transferloader
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-21
win.rusty_clawhttps://malpedia.caad.fkie.fraunhofer.de/details/win.rusty_claw
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-45
MalwareBazaarhttps://bazaar.abuse.ch/sample/10e1d453d4f9ca05ff6af3dcd7766a17ca1470ee89ba90feee5d52f8d2b18a4c/
MalwareBazaarhttps://bazaar.abuse.ch/sample/7602e2c1ae27e1b36ee4aed357e505f14496f63db29fb4fcdd0d8a9db067a5c4/
MalwareBazaarhttps://bazaar.abuse.ch/sample/b1fe8fbbb0b6de0f1dcd4146d674a71c511488a9eb4538689294bd782df040df/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rustyflag
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-46
2023-09-14 - Deep Instinct - Operation Rusty Flag – A Malicious Campaign Against Azerbaijanian Targetshttps://www.deepinstinct.com/blog/operation-rusty-flag-a-malicious-campaign-against-azerbaijanian-targets
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-22
win.unidentified_110https://malpedia.caad.fkie.fraunhofer.de/details/win.unidentified_110
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-46
MalwareBazaarhttps://bazaar.abuse.ch/sample/5327308fee51fc6bb95996c4185c4cfcbac580b747d79363c7cf66505f3ff6db/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rustypages
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-47
2025-08-19 - Kandji - Threat Detected: RustyPages Malware - Part Ihttps://the-sequence.com/rustypages-malware-part-i
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-47
MalwareBazaarhttps://bazaar.abuse.ch/sample/e98756472404aeef70ba4d403339962989d9ed733fa0f6a23bdf4c2900d7e877/
MalwareBazaarhttps://bazaar.abuse.ch/sample/7ab47b7b14f4d6848b9f4d410d1315ccc68e9a6714d94a2e870b6ba77d28e828/
MalwareBazaarhttps://bazaar.abuse.ch/sample/5cee6368c6a9922a81a03831979947db8e5365986b4ad725c552ab6018a083b3/
MalwareBazaarhttps://bazaar.abuse.ch/sample/d2c48f4fa4b0285889ef6c7667e12a1c0eda1393632ef2eac67b32777bf096f7/
MalwareBazaarhttps://bazaar.abuse.ch/sample/f4c41111960771e0d7558ec2453b76ba9c422fcb9408e09a8de1fd611c272846/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#rustywater
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#aliases-8
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-48
2025-12-22 - Seqrite - UNG0801: Tracking Threat Clusters obsessed with AV Icon Spoofing targeting Israelhttps://www.seqrite.com/blog/ung0801-tracking-threat-clusters-obsessed-with-av-icon-spoofing-targeting-israel/
2026-01-08 - CloudSEK - Reborn in Rust: Muddy Water Evolves Tooling with RustyWater Implanthttps://www.cloudsek.com/blog/reborn-in-rust-muddywater-evolves-tooling-with-rustywater-implant
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-48
MalwareBazaarhttps://bazaar.abuse.ch/sample/a2001892410e9f34ff0d02c8bc9e7c53b0bd10da58461e1e9eab26bdbf410c79/
MalwareBazaarhttps://bazaar.abuse.ch/sample/7523e53c979692f9eecff6ec760ac3df5b47f172114286e570b6bba3b2133f58/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#snowflake-stealer
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-49
2022-02-14 - Finch4 - SnowFlake Stealer Analysishttps://github.com/Finch4/Malware-Analysis-Reports/blob/4f3baae07575e799db97ec22cb271d89c0fb0879/SnowFlake%20Stealer/SnowFlake%20Stealer%20Analysis.pdf
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-49
MalwareBazaarhttps://bazaar.abuse.ch/sample/1ae99a454f6c11e30c346ca825e2d20bc5450ddb808f25dd20a4d952604d34f0/
MalwareBazaarhttps://bazaar.abuse.ch/sample/4f10f503422560da8a332c30323401af59a914af940716d06e139ed7371be53f/
MalwareBazaarhttps://bazaar.abuse.ch/sample/5e1626ac3140548619efba38a154b98234080908158378ad2e7e4af9e92cfbb8/
MalwareBazaarhttps://bazaar.abuse.ch/sample/674f31aed8544f2f54423de908559f3d1964ef4f3391d2bf989915766b8c42e9/
MalwareBazaarhttps://bazaar.abuse.ch/sample/8441c5d0d5ee30f94f54459ba89a3a2d20677d98313c120f32bf98015214049f/
MalwareBazaarhttps://bazaar.abuse.ch/sample/b44db0bf0992d55c7353fe368322fe0b1e912b2a381c4bf8b7c56c9fcd2a86ff/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#spica
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-50
2024-01-18 - Google TAG - Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malwarehttps://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-50
MalwareBazaarhttps://bazaar.abuse.ch/sample/37c52481711631a5c73a6341bd8bea302ad57f02199db7624b580058547fb5a9/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#ssload
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-51
2024-04-11 - Palo Alto Networks - Contact Forms Campaign Pushes SSLoad Malwarehttps://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-04-15-IOC-for-Contact-Forms-campaign-SSLoad-activity.txt
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-23
win.ssloadhttps://malpedia.caad.fkie.fraunhofer.de/details/win.ssload
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-51
MalwareBazaarhttps://bazaar.abuse.ch/sample/09ffc4188bf11bf059b616491fcb8a09a474901581f46ec7f2c350fbda4e1e1c/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#sysjoker-rust-variant
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#aliases-9
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-52
2023-11-23 - Check Point - Israel-Hamas War Spotlight: Shaking the Rust Off SysJokerhttps://research.checkpoint.com/2023/israel-hamas-war-spotlight-shaking-the-rust-off-sysjoker/
2023-11-27 - Intezer - WildCard: The APT Behind SysJoker Targets Critical Sectors in Israelhttps://intezer.com/blog/research/wildcard-evolution-of-sysjoker-cyber-threat/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-24
win.sysjokerhttps://malpedia.caad.fkie.fraunhofer.de/details/win.sysjoker
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-52
MalSharehttps://malshare.com/sample.php?action=detail&hash=d4095f8b2fd0e6deb605baa1530c32336298afd026afc0f41030fa43371e3e72
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#tetra-loader
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-53
2025-05-22 - Cisco - UAT-6382 exploits Cityworks zero-day vulnerability to deliver malwarehttps://blog.talosintelligence.com/uat-6382-exploits-cityworks-vulnerability/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#malpedia-25
win.tetra_loaderhttps://malpedia.caad.fkie.fraunhofer.de/details/win.tetra_loader
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-53
MalwareBazaarhttps://bazaar.abuse.ch/sample/14ed3878b6623c287283a8a80020f68e1cb6bfc37b236f33a95f3a64c4f4611f/
MalwareBazaarhttps://bazaar.abuse.ch/sample/1c38e3cda8ac6d79d9da40834367697a209c6b07e6b3ab93b3a4f375b161a901/
MalwareBazaarhttps://bazaar.abuse.ch/sample/4ffc33bdc8527a2e8cb87e49cdc16c3b1480dfc135e507d552f581a67d1850a9/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#notes-8
https://github.com/lv183037/MaLoader/https://github.com/lv183037/MaLoader/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#unnamed-rust-ddos-botnet
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-54
2025-11-30 - Beelzebub - How I Reverse Engineered a Rust Botnet and Built a C2 Honeypot to Monitor Its Targetshttps://beelzebub.ai/blog/rust-ddos-botnet-honeypot-c2-decoding/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-54
MalwareBazaarhttps://bazaar.abuse.ch/sample/fd6ec293c37abd2d832659697d42c781727b0d32ba6bba3f0387b0dedaabe74e/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#zeon-ransomware-rust-variant
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#writeups-55
2022-06-22 - SentinelOne - From the Front Lines | 3 New and Emerging Ransomware Threats Striking Businesses in 2022https://www.sentinelone.com/blog/from-the-front-lines-3-new-and-emerging-ransomware-threats-striking-businesses-in-2022/
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#samples-55
MalSharehttps://malshare.com/sample.php?action=detail&hash=fb57abf08a85f1d7ca0a6fdcd76b04ccf964a5b05f2f784492083994773e4590
https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#notes-9
MalSharehttps://malshare.com/sample.php?action=detail&hash=c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a
Royal Ransomwarehttps://malpedia.caad.fkie.fraunhofer.de/details/win.royal_ransom
CISA's advisory on Royal Ransomwarehttps://www.cisa.gov/news-events/cybersecurity-advisories/aa23-061a
rust https://patch-diff.githubusercontent.com/topics/rust
malware https://patch-diff.githubusercontent.com/topics/malware
malwareanalysis https://patch-diff.githubusercontent.com/topics/malwareanalysis
rust-lang https://patch-diff.githubusercontent.com/topics/rust-lang
cybersecurity https://patch-diff.githubusercontent.com/topics/cybersecurity
malware-analysis https://patch-diff.githubusercontent.com/topics/malware-analysis
malware-research https://patch-diff.githubusercontent.com/topics/malware-research
threatintel https://patch-diff.githubusercontent.com/topics/threatintel
malware-samples https://patch-diff.githubusercontent.com/topics/malware-samples
threat-intelligence https://patch-diff.githubusercontent.com/topics/threat-intelligence
Readme https://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery#readme-ov-file
Please reload this pagehttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery
Activityhttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/activity
Custom propertieshttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/custom-properties
205 starshttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/stargazers
4 watchinghttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/watchers
10 forkshttps://patch-diff.githubusercontent.com/decoderloop/rust-malware-gallery/forks
Report repository https://patch-diff.githubusercontent.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2Fdecoderloop%2Frust-malware-gallery&report=decoderloop+%28user%29
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.