C++ self-Injecting dropper based on various EDR evasion techniques.
-
Updated
Feb 11, 2024 - C
C++ self-Injecting dropper based on various EDR evasion techniques.
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.
ApexLdr is a DLL Payload Loader written in C
Indirect Syscall invocation via thread hijacking
NTAPI hook bypass with (semi) legit stack trace
Transparently call NTAPI via Halo's Gate with indirect syscalls.
A shellcode loader powered by a web panel.
shellcode loader that uses indirect syscalls written in D Lang The loader bypasses user-mode hooks by resolving system calls manually from NTDLL using a hash-based method.
Shellcode Loader Library.
Add a description, image, and links to the indirect-syscall topic page so that developers can more easily learn about it.
To associate your repository with the indirect-syscall topic, visit your repo's landing page and select "manage topics."