Dump system call codes, names, and offsets from Ntdll.dll
☆84Oct 16, 2023Updated 2 years ago
Alternatives and similar repositories for SyscallDumper
Users that are interested in SyscallDumper are comparing it to the libraries listed below
Sorting:
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Inline syscalls made easy for windows on clang☆736Jun 21, 2024Updated last year
- ☆31Aug 23, 2020Updated 5 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆243Jul 7, 2021Updated 4 years ago
- Basic C# Project that will take an MSBuild payload and run it with MSBuild via ClickOnce.☆93Oct 24, 2020Updated 5 years ago
- ☆36Mar 27, 2022Updated 3 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆30Apr 8, 2020Updated 5 years ago
- C/C++ example of InjectMouseInput function☆35Apr 17, 2021Updated 4 years ago
- x64 Registration-Free In-Process COM Automation Server.☆51Nov 28, 2022Updated 3 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- posting example☆15May 11, 2020Updated 5 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆13Jul 17, 2020Updated 5 years ago
- Create file system symbolic links from low privileged user accounts within PowerShell☆94Jun 20, 2022Updated 3 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- Win7内核私有符号结构转储☆70Sep 3, 2021Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- X86/X64 Hardware Breakpoint Manager☆42Jun 18, 2021Updated 4 years ago
- Single header library to generate random numbers at compile time using KISS random generator☆13Feb 12, 2021Updated 5 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- Custom implementation of DbgHelp's MiniDumpWriteDump function. Uses static syscalls to replace low-level functions like NtReadVirtualMemo…☆127Jan 18, 2022Updated 4 years ago
- 学习windows驱动相关☆23Jul 31, 2019Updated 6 years ago
- ☆28Sep 29, 2020Updated 5 years ago