[dependencies.bitflags]
default-features = false
version = "2.8.0"
[dependencies.cfg-if]
version = "1.0.0"
[dependencies.obfstr]
version = "0.4.4"
[dependencies.spin]
version = "0.10.0"
[[example]]
name = "2. get_module_and_function"
path = "examples/2. get_module_and_function/main.rs"
[[example]]
name = "dinvoke"
path = "examples/1. dinvoke/main.rs"
[[example]]
name = "hash"
path = "examples/3. hash/main.rs"
[[example]]
name = "library_proxy"
path = "examples/4. library_proxy/main.rs"
[[example]]
name = "syscall"
path = "examples/5. syscall/main.rs"
[[example]]
name = "tampered_syscall"
path = "examples/6. tampered_syscall/main.rs"
[features]
alloc = []
default = []
dinvk_panic = []
[lib]
name = "dinvk"
path = "src/lib.rs"
[package]
autobenches = false
autobins = false
autoexamples = false
autolib = false
autotests = false
build = false
categories = ["os", "security", "no-std"]
description = "Dynamically invoke arbitrary code and use various tricks written idiomatically in Rust (Dinvoke)"
edition = "2024"
exclude = [".gitignore", "target/", ".vscode/"]
homepage = "https://github.com/joaoviictorti/dinvk"
keywords = ["hacking", "dinvoke", "windows", "rust", "redteam"]
license = "MIT"
name = "dinvk"
readme = "README.md"
repository = "https://github.com/joaoviictorti/dinvk"
version = "0.2.5"
[package.metadata.docs.rs]
default-target = "x86_64-pc-windows-msvc"
targets = ["x86_64-pc-windows-gnu", "x86_64-pc-windows-msvc", "i686-pc-windows-gnu", "i686-pc-windows-msvc", "aarch64-pc-windows-msvc"]