This is a PoC technique for indirect syscall execution, by suspending, altering and resuming a thread.
The target thread's context is modified in order to land on a syscall instruction in NTDLL (we're doing NtAllocateVirtualMemory), with registers and stack prepared for syscall execution.
There's no need for syscall stubs, since all the arguments are written directly to the target's thread context, while it's suspended.
-
Couldn't load subscription status.
- Fork 3
Indirect Syscall invocation via thread hijacking
License
Couldn't load subscription status.
x0reaxeax/SysCook64
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
About
Indirect Syscall invocation via thread hijacking
Topics
Resources
License
Stars
Watchers
Forks
Releases
No releases published