Shellcode injector using direct syscalls
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
ETW based POC to identify direct and indirect syscalls
Injects shellcode into remote processes using direct syscalls
Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).
Shellcode loader using direct syscalls via Hell's Gate and payload encryption.
A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.
Shellcode injection POC using syscalls.
Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).
Inline syscalls made easy for windows on clang
Direct Sparse Odometry
Get fresh Syscalls from a fresh ntdll.dll copy
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
A stupid game for learning about containers, capabilities, and syscalls.
indirect syscalls for AV/EDR evasion in Go assembly
Semi-direct Visual Odometry