GitHub 中文社区
回车: Github搜索    Shift+回车: Google搜索
论坛
排行榜
趋势
登录

©2025 GitHub中文社区论坛GitHub官网网站地图GitHub官方翻译

  • X iconGitHub on X
  • Facebook iconGitHub on Facebook
  • Linkedin iconGitHub on LinkedIn
  • YouTube iconGitHub on YouTube
  • Twitch iconGitHub on Twitch
  • TikTok iconGitHub on TikTok
  • GitHub markGitHub’s organization on GitHub

编程语言

”syscalls“ 的搜索结果

Mateusz Jurczyk
windows-syscalls
Mateusz Jurczyk@j00ru

Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)

HTML2.37 k
3 个月前

相关主题

syscallsedr-bypassedr-evasionLinuxAssembly安全containersseccomp

Google   Bing   GitHub

HellHall
@Maldev-Academy

Performing Indirect Clean Syscalls

syscallsedrs
C565
2 年前
SyscallTables
@hfiref0x

Windows NT Syscall tables

win64win32k
C1.31 k
3 天前
inline_syscall
@JustasMasiulis

Inline syscalls made easy for windows on clang

syscallsyscallsWindowsx64inline
C++714
1 年前
TamperingSyscalls
@rad9800

C++486
3 年前
RecycledInjector
@florylsk

Native Syscalls Shellcode Injector

Hackingpentestingredteam
C266
2 年前
DEFCON-31-Syscalls-Workshop
@VirtualAlllocEx

Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".

antivirus-bypassantivirus-evasionedr-bypassedr-evasionmalware-development
C675
2 个月前
Shhhloader
@icyguider

Syscall Shellcode Loader (Work in Progress)

Python1.21 k
1 年前
genuinetools
contained.af
genuinetools@genuinetools

A stupid game for learning about containers, capabilities, and syscalls.

Linuxsyscallsgamecontainers安全
JavaScript903
2 年前
Freeze存档
@optiv

Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods

Go1.45 k
2 年前
DefensiveInjector
@bats3c

Shellcode injector using direct syscalls

C120
5 年前
SyscallPOC
@SolomonSklash

Shellcode injection POC using syscalls.

C#114
5 年前
BouncyGate存档
@eversinc33

Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).

Nimsyscalls
Nim184
2 年前
Direct-Syscalls-vs-Indirect-Syscalls
@VirtualAlllocEx

The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls

av-bypassav-evasiondirect-syscallsedr-bypassedr-evasion
C197
1 年前
NimGetSyscallStub
@S3cur3Th1sSh1t

Get fresh Syscalls from a fresh ntdll.dll copy

Nim232
3 年前
acheron
@f1zm0

indirect syscalls for AV/EDR evasion in Go assembly

evasionadversary-emulationav-evasionedr-bypassedr-evasion
Assembly332
2 年前
Hunt-Weird-Syscalls
@thefLink

ETW based POC to identify direct and indirect syscalls

C++187
2 年前
inline-syscall
@nbs32k

Inline syscalls made for MSVC supporting x64 and WOW64

WindowsMicrosoftntdll
C++181
2 年前
AtlasLdr
@Krypteria

Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls

C++indirect-syscallloadermanualmappingredteam
C++370
9 个月前
Containers
oci-seccomp-bpf-hook
Containers@containers

OCI hook to trace syscalls and generate a seccomp profile

syscallsbccseccomp-profilecontainersoci
Go326
1 个月前
NASM-Assembly-Linux-Notes
@IDouble

🐧 Assembly with Linux (Notes, Syscalls, Protection Rings) 🐧

nasmLinuxkernel-modeAssemblysyscalls
Assembly123
1 年前
harpoon
@alegrey91

🔍 Seccomp profiling and function-level tracing tool.

eBPFebpf-programsGoseccomp安全
C155
1 个月前
GhostlyHollowingViaTamperedSyscalls
@Maldev-Academy

Implementing the ghostly hollowing PE injection technique using tampered syscalls.

C165
4 个月前
linux-syscalls
@mebeim

🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)

Linuxsecurity-research安全
JavaScript189
3 个月前
SyscallsExample
@m0rv4i

Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.

Assembly68
4 年前
loading...