Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust
-
Updated
Jun 4, 2024 - Rust
Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust
A stealthy, header-only C++ library for Windows internals research. Implements disk-based SSN (System Service Number) recovery, manual PE parsing, and page-aligned memory scanning to bypass user-mode EDR/AV hooks.
x64 rewrite of GuidedHacking's Anti-debugging techniques on a (bad looking) Win32 application.
Hell's Gate (Direct System Call)
Add a description, image, and links to the hells-gate topic page so that developers can more easily learn about it.
To associate your repository with the hells-gate topic, visit your repo's landing page and select "manage topics."