{"id":24698755,"url":"https://github.com/im-razvan/ntdllsyscalldumper","last_synced_at":"2025-03-22T03:42:21.726Z","repository":{"id":273763941,"uuid":"920805225","full_name":"im-razvan/ntdllSyscallDumper","owner":"im-razvan","description":"A minimal C++ tool to extract syscall IDs from ntdll.dll on Windows x64 systems.","archived":false,"fork":false,"pushed_at":"2025-01-23T08:46:28.000Z","size":31,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-22T03:42:18.059Z","etag":null,"topics":["cpp","syscall","windows"],"latest_commit_sha":null,"homepage":"","language":"C++","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/im-razvan.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-01-22T19:58:14.000Z","updated_at":"2025-03-07T10:25:33.000Z","dependencies_parsed_at":"2025-01-22T20:46:54.079Z","dependency_job_id":null,"html_url":"https://github.com/im-razvan/ntdllSyscallDumper","commit_stats":null,"previous_names":["im-razvan/ntdllsyscalldumper"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/im-razvan%2FntdllSyscallDumper","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/im-razvan%2FntdllSyscallDumper/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/im-razvan%2FntdllSyscallDumper/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/im-razvan%2FntdllSyscallDumper/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/im-razvan","download_url":"https://codeload.github.com/im-razvan/ntdllSyscallDumper/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":244902927,"owners_count":20529114,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cpp","syscall","windows"],"created_at":"2025-01-27T04:29:57.893Z","updated_at":"2025-03-22T03:42:21.704Z","avatar_url":"https://github.com/im-razvan.png","language":"C++","readme":"# ntdllSyscallDumper\r\n\r\nA minimal C++ tool to extract syscall IDs from `ntdll.dll` on Windows x64 systems.\r\n\r\n## How does it work\r\n\r\n![ntdll preview](https://github.com/im-razvan/ntdllSyscallDumper/blob/main/ntdll_preview.png?raw=true)\r\n\r\nThis tool extracts Windows x64 system call IDs by parsing `ntdll.dll`, detecting Nt-prefixed functions with a specific pattern (`4C 8B D1 B8`), and then outputs the names and IDs to `syscalls.csv`.\r\n\r\n---\r\n\r\nTested on Windows 11 23H2 and 24H2.","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fim-razvan%2Fntdllsyscalldumper","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fim-razvan%2Fntdllsyscalldumper","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fim-razvan%2Fntdllsyscalldumper/lists"}