#

direct-syscalls

https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

C 208
2 年前
https://static.github-zh.com/github_avatars/annihilatorq?size=40

windows syscalls with a single line and a high level of abstraction. has modern cpp20 wrappers and utilities, range-based DLL and export enumeration, wrapper around KUSER_SHARED_DATA. supported compil...

C++ 191
14 天前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40

Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).

C 141
2 年前
https://static.github-zh.com/github_avatars/voidvxvt?size=40

Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks

C 121
9 个月前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40

This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for local privilege escalation in the context of an unquoted service p...

C 54
2 年前
https://static.github-zh.com/github_avatars/Fadouse?size=40

BypassETWDirectSyscallShellcodeLoader is a robust C++14 application designed for secure and stealthy shellcode execution. It incorporates advanced anti-debugging and anti-sandboxing techniques to evad...

C++ 13
7 个月前
https://static.github-zh.com/github_avatars/Hue-Jhan?size=40

Dll injection using direct System Calls, undetected by Windows Defender & Bitdefender

C 5
6 天前
https://static.github-zh.com/github_avatars/Hue-Jhan?size=40

Trojan that uses direct System Calls to inject shellcode into a target process, undetected by Windows Defender & Bitdefender

C 4
7 天前
https://static.github-zh.com/github_avatars/jungjin0003?size=40

Hell's Gate (Direct System Call)

C 0
4 个月前
Website
Wikipedia