{"id":23421565,"url":"https://github.com/evilbytecode/etw-patch","last_synced_at":"2026-02-28T11:10:03.256Z","repository":{"id":246009755,"uuid":"819827330","full_name":"EvilBytecode/ETW-Patch","owner":"EvilBytecode","description":"code snippet provided demonstrates how to patch the EtwEventWrite function in the ntdll.dll library on Windows using CGO (C Go). ","archived":false,"fork":false,"pushed_at":"2024-06-27T06:42:34.000Z","size":5,"stargazers_count":8,"open_issues_count":0,"forks_count":1,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-04-19T18:12:03.776Z","etag":null,"topics":["av-evasion","etw","etw-bypass","etw-evasion","etweventwrite","evasion","fud"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/EvilBytecode.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-06-25T09:20:39.000Z","updated_at":"2025-03-18T17:59:22.000Z","dependencies_parsed_at":"2024-06-27T07:59:34.266Z","dependency_job_id":null,"html_url":"https://github.com/EvilBytecode/ETW-Patch","commit_stats":null,"previous_names":["evilbytecode/etw-patch"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/EvilBytecode/ETW-Patch","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FETW-Patch","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FETW-Patch/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FETW-Patch/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FETW-Patch/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/EvilBytecode","download_url":"https://codeload.github.com/EvilBytecode/ETW-Patch/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FETW-Patch/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":29931513,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-02-28T09:58:13.507Z","status":"ssl_error","status_checked_at":"2026-02-28T09:57:57.047Z","response_time":90,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["av-evasion","etw","etw-bypass","etw-evasion","etweventwrite","evasion","fud"],"created_at":"2024-12-23T02:16:03.594Z","updated_at":"2026-02-28T11:10:03.188Z","avatar_url":"https://github.com/EvilBytecode.png","language":"Go","readme":"# ETW-Patch\n\u003ca href=\"https://t.me/pulzetools\"\u003e\u003cimg src=\"https://img.shields.io/badge/Join%20my%20Telegram%20group-2CA5E0?style=for-the-badge\u0026logo=telegram\u0026labelColor=db44ad\u0026color=5e2775\"\u003e\u003c/a\u003e\n\n- This repository contains code that demonstrates how to patch the ```EtwEventWrite``` function from the ```ntdll.dll``` library on Windows using CGO. This technique modifies the behavior of ```EtwEventWrite``` by injecting custom assembly code that replaces the beginning of the function.\n\n## How it works?\n- Uses Windows API functions ```(GetModuleHandleA, GetProcAddress, VirtualProtect)``` to locate and modify the EtwEventWrite function in memory.\n\n- Defines a byte sequence ```(0x33, 0xC0, 0xC3)``` that represents the assembly instructions ```(XOR EAX, EAX; RET)``` used to replace the beginning of the EtwEventWrite function. This effectively nullifies the function's effect, making it return immediately without performing its intended actions.\n\n\n## License\nThis project is licensed under the MIT License. See the LICENSE file for details.","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fevilbytecode%2Fetw-patch","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fevilbytecode%2Fetw-patch","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fevilbytecode%2Fetw-patch/lists"}