Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
- Updated
Dec 22, 2024 - C
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
Reversing and reimplementing "powercfg /requests" using Native API
Dump syscall numbers from ntdll.dll
An example of native NT application
Demo programs using the Windows Native API
NT API Code Injection using NtCreateSection and NtMapViewOfSection to inject shellcode into a remote process. This method allows for efficient memory manipulation and code execution within target processes.
This is a C++ library that can be used to access different information about processes on the windows platform, it also provides you with the capability of executing 64-bit code in Wow64 processes.
Source code examples while me learning Windows System Programming
Clear the Windows Explorer icon cache as fast as possible.
Add a description, image, and links to the native-api topic page so that developers can more easily learn about it.
To associate your repository with the native-api topic, visit your repo's landing page and select "manage topics."