Skip to content

A Rust-based tool that facilitates indirect system calls in Windows to inject shellcode.

License

Notifications You must be signed in to change notification settings

Cyb3rV1c/Rust-IndirectSysCalls

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 

Repository files navigation

Rust-IndirectSysCalls

Description: This Rust tool facilitates the execution of indirect system calls within Windows environments, enabling secure and efficient interactions with the system's kernel. Designed to bypass the limitations of direct system API calls.

Usage

  1. Git clone Repo

  2. Specify path to shellcode in main.rs

  3. Cargo Build & Run

Example Output

Execution

Screenshot 2024-12-23 at 11 19 31 AM

Credits

https://redops.at/en/blog/direct-syscalls-vs-indirect-syscalls

https://github.com/VirtualAlllocEx/Direct-Syscalls-vs-Indirect-Syscalls/tree/main

Disclaimer

This project is intended for educational and research purposes only.

The code provided in this repository is designed to help individuals understand and improve their knowledge of cybersecurity, ethical hacking, and malware analysis techniques. It must not be used for malicious purposes or in any environment where you do not have explicit permission from the owner.

About

A Rust-based tool that facilitates indirect system calls in Windows to inject shellcode.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published