An open API service indexing awesome lists of open source software.

https://github.com/x0reaxeax/syscook64

Indirect Syscall invocation via thread hijacking
https://github.com/x0reaxeax/syscook64

detection-evasion edr-bypass edr-evasion hook-bypass indirect-syscall redteam thread-context

Last synced: 2 months ago
JSON representation

Indirect Syscall invocation via thread hijacking

Awesome Lists containing this project

README

        

# SysCook64 - Cooking thread contexts for fun and profit

## What is this?
This is a PoC technique for indirect syscall execution, by suspending, altering and resuming a thread.
The target thread's context is modified in order to land on a `syscall` instruction in `NTDLL` (we're doing `NtAllocateVirtualMemory`), with registers and stack prepared for syscall execution.
There's no need for syscall stubs, since all the arguments are written directly to the target's thread context, while it's suspended.

## Demo
[YouTube](https://youtu.be/HU47BmJJw98)