GitHub 中文社区
回车: Github搜索    Shift+回车: Google搜索
论坛
排行榜
趋势
登录

©2025 GitHub中文社区论坛GitHub官网网站地图GitHub官方翻译

  • X iconGitHub on X
  • Facebook iconGitHub on Facebook
  • Linkedin iconGitHub on LinkedIn
  • YouTube iconGitHub on YouTube
  • Twitch iconGitHub on Twitch
  • TikTok iconGitHub on TikTok
  • GitHub markGitHub’s organization on GitHub
集合主题趋势排行榜
#

direct-syscalls

Website
Wikipedia
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / DEFCON-31-Syscalls-Workshop

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

antivirus-bypassantivirus-evasionedr-bypassedr-evasionmalware-developmentwindows-internalsdirect-syscallsindirect-syscallsmalware-analysismalware-development-guideworkshopshellcode-loadersyscallsShell
C 666
24 天前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Direct-Syscalls-vs-Indirect-Syscalls

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasionindirect-syscallsshellcode-loader
C 194
1 年前
https://static.github-zh.com/github_avatars/annihilatorq?size=40
annihilatorq / shadow_syscall

windows syscalls with a single line and a high level of abstraction. has modern cpp20 wrappers and utilities, range-based DLL and export enumeration, wrapper around KUSER_SHARED_DATA. supported compil...

direct-syscalls逆向工程syscallsyscallsShellanalysisC++exporthashingheader-onlyobfuscation
C++ 182
8 天前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Direct-Syscalls-A-journey-from-high-to-low

Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasion
C 133
2 年前
https://static.github-zh.com/github_avatars/voidvxvt?size=40
voidvxvt / HellBunny

Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks

direct-syscallsedr-evasionindirect-syscallsmalware-developmentmsvcWindowsprocess-injectionedr-bypassdllshellcode-injectionshellcode-loader
C 107
6 个月前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / DSC_SVC_REMOTE

This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for local privilege escalation in the context of an unquoted service p...

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasion
C 51
2 年前
https://static.github-zh.com/github_avatars/Fadouse?size=40
Fadouse / BypassETWDirectSyscallShellcodeLoader

BypassETWDirectSyscallShellcodeLoader is a robust C++14 application designed for secure and stealthy shellcode execution. It incorporates advanced anti-debugging and anti-sandboxing techniques to evad...

bypass-antivirusdirect-syscallsinjectorshellcode-injectionshellcode-loader
C++ 11
4 个月前
https://static.github-zh.com/github_avatars/jungjin0003?size=40
jungjin0003 / HellsGate

Hell's Gate (Direct System Call)

direct-syscalls
C 0
1 个月前