Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
-
Updated
Jan 17, 2024 - C++
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
C++ self-Injecting dropper based on various EDR evasion techniques.
Indirect Syscall invocation via thread hijacking
NTAPI hook bypass with (semi) legit stack trace
A shellcode loader powered by a web panel.
Transparently call NTAPI via Halo's Gate with indirect syscalls.
Add a description, image, and links to the indirect-syscall topic page so that developers can more easily learn about it.
To associate your repository with the indirect-syscall topic, visit your repo's landing page and select "manage topics."