This is a PoC technique for indirect syscall execution, by suspending, altering and resuming a thread.
The target thread's context is modified in order to land on a syscall
instruction in NTDLL
(we're doing NtAllocateVirtualMemory
), with registers and stack prepared for syscall execution.
There's no need for syscall stubs, since all the arguments are written directly to the target's thread context, while it's suspended.
-
Notifications
You must be signed in to change notification settings - Fork 2
Indirect Syscall invocation via thread hijacking
License
x0reaxeax/SysCook64
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Indirect Syscall invocation via thread hijacking
Topics
Resources
License
Stars
Watchers
Forks
Releases
No releases published