Skip to content

Latest commit

 

History

History
23 lines (15 loc) · 1.88 KB

File metadata and controls

23 lines (15 loc) · 1.88 KB

RecycledGate 🦀

This is just another implementation of Hellsgate + Halosgate/Tartarusgate.

Recycledgate

This probably bypasses some EDR trying to detect abnormal systemcalls.

This combines elements of Hells Gate (extracting syscall numbers from NTDLL stubs) and Halos Gate (searching nearby stubs if the target is hooked) to dynamically resolve and invoke NT syscalls.

The key evasion aspect is jumping to recycled syscall; ret sequences within ntdlls loaded memory, ensuring the syscall instruction executes from NTDLLs address space bypassing EDR hooks on exports while avoiding inline/direct "syscall" in your binary, which can trigger detections in syscall-detect tool.

I have made some changes to the logic and code that support compatibility.

Download RecycledGate PoC: Downlaod

Credits / Resources