GitHub 中文社区
回车: Github搜索    Shift+回车: Google搜索
论坛
排行榜
趋势
登录

©2025 GitHub中文社区论坛GitHub官网网站地图GitHub官方翻译

  • X iconGitHub on X
  • Facebook iconGitHub on Facebook
  • Linkedin iconGitHub on LinkedIn
  • YouTube iconGitHub on YouTube
  • Twitch iconGitHub on Twitch
  • TikTok iconGitHub on TikTok
  • GitHub markGitHub’s organization on GitHub
集合主题趋势排行榜
#

indirect-syscalls

Website
Wikipedia
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / DEFCON-31-Syscalls-Workshop

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

antivirus-bypassantivirus-evasionedr-bypassedr-evasionmalware-developmentwindows-internalsdirect-syscallsindirect-syscallsmalware-analysismalware-development-guideworkshopshellcode-loadersyscallsShell
C 666
24 天前
https://static.github-zh.com/github_avatars/VirtualAlllocEx?size=40
VirtualAlllocEx / Direct-Syscalls-vs-Indirect-Syscalls

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasionindirect-syscallsshellcode-loader
C 194
1 年前
https://static.github-zh.com/github_avatars/voidvxvt?size=40
voidvxvt / HellBunny

Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks

direct-syscallsedr-evasionindirect-syscallsmalware-developmentmsvcWindowsprocess-injectionedr-bypassdllshellcode-injectionshellcode-loader
C 107
6 个月前
https://static.github-zh.com/github_avatars/EvilBytecode?size=40
EvilBytecode / EByte-Shellcode-Loader

shellcode loader that uses indirect syscalls written in D Lang The loader bypasses user-mode hooks by resolving system calls manually from NTDLL using a hash-based method.

av-evasionevasionfudindirect-syscallindirect-syscallsShell
D 9
9 个月前