GitHub 中文社区
回车: Github搜索    Shift+回车: Google搜索
论坛
排行榜
趋势
登录

©2025 GitHub中文社区论坛GitHub官网网站地图GitHub官方翻译

  • X iconGitHub on X
  • Facebook iconGitHub on Facebook
  • Linkedin iconGitHub on LinkedIn
  • YouTube iconGitHub on YouTube
  • Twitch iconGitHub on Twitch
  • TikTok iconGitHub on TikTok
  • GitHub markGitHub’s organization on GitHub

编程语言

”direct-syscalls“ 的搜索结果

DefensiveInjector
@bats3c

Shellcode injector using direct syscalls

C120
5 年前

相关主题

syscallsedr-evasionedr-bypassdirect-syscallsav-evasionshellcode-loaderindirect-syscallsav-bypassAssemblywindows

Google   Bing   GitHub

Freeze存档
@optiv

Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods

Go1.45 k
2 年前
Direct-Syscalls-vs-Indirect-Syscalls
@VirtualAlllocEx

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasion
C197
1 年前
Freeze.rs存档
@optiv

Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST

Rust719
2 年前
DEFCON-31-Syscalls-Workshop
@VirtualAlllocEx

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

antivirus-bypassantivirus-evasionedr-bypassedr-evasionmalware-development
C672
1 个月前
Hunt-Weird-Syscalls
@thefLink

ETW based POC to identify direct and indirect syscalls

C++187
2 年前
stealthInjector
@JohnWoodman

Injects shellcode into remote processes using direct syscalls

C++79
5 年前
Direct-Syscalls-A-journey-from-high-to-low
@VirtualAlllocEx

Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasion
C133
2 年前
BenevolentLoader
@jakobfriedl

Shellcode loader using direct syscalls via Hell's Gate and payload encryption.

C90
1 年前
manual-syscall-detect
@xenoscr

A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.

C++111
3 年前
HellHall
@Maldev-Academy

Performing Indirect Clean Syscalls

syscallsedrs
C562
2 年前
RecycledInjector
@florylsk

Native Syscalls Shellcode Injector

Hackingpentestingredteam
C267
2 年前
SyscallPOC
@SolomonSklash

Shellcode injection POC using syscalls.

C#114
5 年前
BouncyGate存档
@eversinc33

Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).

Nimsyscalls
Nim183
2 年前
inline_syscall
@JustasMasiulis

Inline syscalls made easy for windows on clang

syscallsyscallswindowsx64inline
C++711
1 年前
dso
@JakobEngel

Direct Sparse Odometry

C++2.37 k
1 年前
NimGetSyscallStub
@S3cur3Th1sSh1t

Get fresh Syscalls from a fresh ntdll.dll copy

Nim232
3 年前
Mateusz Jurczyk
windows-syscalls
Mateusz Jurczyk@j00ru

Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)

HTML2.36 k
2 个月前
genuinetools
contained.af
genuinetools@genuinetools

A stupid game for learning about containers, capabilities, and syscalls.

Linuxsyscallsgamecontainers安全
JavaScript902
2 年前
acheron
@f1zm0

indirect syscalls for AV/EDR evasion in Go assembly

evasionadversary-emulationav-evasionedr-bypassedr-evasion
Assembly331
2 年前
Robotics and Perception Group
rpg_svo
Robotics and Perception Group@uzh-rpg

Semi-direct Visual Odometry

C++2.16 k
6 年前
inline-syscall
@nbs32k

Inline syscalls made for MSVC supporting x64 and WOW64

windowsMicrosoftntdll
C++181
2 年前
Indy
@IndySockets

Indy - Internet Direct

delphi
Pascal507
15 天前
loading...