You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This probably bypasses some EDR trying to detect abnormal systemcalls.
6
8
7
9
This combines elements of Hells Gate (extracting syscall numbers from NTDLL stubs) and Halos Gate (searching nearby stubs if the target is hooked) to dynamically resolve and invoke NT syscalls.
@@ -16,4 +18,4 @@ I have made some changes to the logic and code that support compatibility.
16
18
*[@Am0nsec](https://twitter.com/am0nsec?lang=en) and @RtlMateusz for the [original Hellsgate implementation](https://github.com/am0nsec/HellsGate)
17
19
*[@0xBoku](https://twitter.com/0xBoku) for inspiration and his [Halosgate implementation](https://github.com/boku7/AsmHalosGate/)
18
20
*[@trickster012](https://twitter.com/trickster012) for the implementation of [Tartarusgate](https://github.com/trickster0/TartarusGate)
19
-
*[@winternl_t](https://twitter.com/winternl_t) for the amazing [blogpost on detection of direct syscalls](https://winternl.com/detecting-manual-syscalls-from-user-mode/)
21
+
*[@winternl_t](https://twitter.com/winternl_t) for the amazing [blogpost on detection of direct syscalls](https://winternl.com/detecting-manual-syscalls-from-user-mode/)
0 commit comments