Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
-
Updated
Jan 17, 2024 - C++
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
C++ self-Injecting dropper based on various EDR evasion techniques.
Indirect Syscall invocation via thread hijacking
NTAPI hook bypass with (semi) legit stack trace
Transparently call NTAPI via Halo's Gate with indirect syscalls.
A shellcode loader powered by a web panel.
Add a description, image, and links to the indirect-syscall topic page so that developers can more easily learn about it.
To associate your repository with the indirect-syscall topic, visit your repo's landing page and select "manage topics."