6 results found Sort:
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Created
2023-04-30
1,148 commits to main branch, last one 11 months ago
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
Created
2023-05-23
10 commits to main branch, last one 11 months ago
windows syscalls with a single line and a high level of abstraction. has modern cpp20 wrappers and utilities, range-based DLL and export enumeration, wrapper around KUSER_SHARED_DATA. supported compil...
Created
2023-08-23
40 commits to shellcode branch, last one 21 days ago
Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low level).
Created
2023-04-14
17 commits to main branch, last one about a year ago
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
Created
2024-12-15
1 commits to main branch, last one 13 days ago
This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for local privilege escalation in the context of an unquoted service p...
Created
2023-05-08
12 commits to main branch, last one about a year ago