C++ self-Injecting dropper based on various EDR evasion techniques.
-
Updated
Feb 11, 2024 - C
8000
C++ self-Injecting dropper based on various EDR evasion techniques.
Reflective x64 PE/DLL Loader impl 8000 emented using Dynamic Indirect Syscalls
A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.
ApexLdr is a DLL Payload Loader written in C
Indirect Syscall invocation via thread hijacking
NTAPI hook bypass with (semi) legit stack trace
Transparently call NTAPI via Halo's Gate with indirect syscalls.
A generic x64 indirect syscall template for RED TEAM OPSEC
A shellcode loader powered by a web panel.
Shellcode Loader Library.
Add a description, image, and links to the indirect-syscall topic page so that developers can more easily learn about it.
To associate your repository with the indirect-syscall topic, visit your repo's landing page and select "manage topics."