Flawww / NtSyscaller
Manually perform syscalls without going through any external API or DLL.
☆18Updated last year
Alternatives and similar repositories for NtSyscaller:
Users that are interested in NtSyscaller are comparing it to the libraries listed below
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 8 months ago
- ☆15Updated 4 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated 9 months ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated 11 months ago
- ☆25Updated last month
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- really ?☆12Updated last year
- Threadless injection via TLS callbacks☆16Updated 4 months ago
- ☆37Updated last month
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 9 months ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 9 months ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- Process Injection: APC Injection☆29Updated 4 years ago
- ☆39Updated 3 years ago
- ☆21Updated 10 months ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 2 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated last year
- Next gen process injection technique☆45Updated 4 years ago
- ☆18Updated 4 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆47Updated 6 months ago
- A simple PE loader.☆25Updated 2 years ago