Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
Inline syscalls made easy for windows on clang
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Syscall Shellcode Loader (Work in Progress)
A stupid game for learning about containers, capabilities, and syscalls.
Shellcode injector using direct syscalls
Shellcode injection POC using syscalls.
Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
Get fresh Syscalls from a fresh ntdll.dll copy
indirect syscalls for AV/EDR evasion in Go assembly
ETW based POC to identify direct and indirect syscalls
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
OCI hook to trace syscalls and generate a seccomp profile
🐧 Assembly with Linux (Notes, Syscalls, Protection Rings) 🐧
Implementing the ghostly hollowing PE injection technique using tampered syscalls.
🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)
Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.