Skip to content

Syscall dumper using LDR_DATA_TABLE_ENTRY structure and gs:segment offset to find base address of ntdll.dll. Then the IMAGE_EXPORT_DIRECTORY is parsed for its pEAT to match with syscall signature { 0x4c,0x8b,0xd1,0xb8 }. The matching addresses are printed on console

Notifications You must be signed in to change notification settings

Axactt/SysCall_Dumper

About

Syscall dumper using LDR_DATA_TABLE_ENTRY structure and gs:segment offset to find base address of ntdll.dll. Then the IMAGE_EXPORT_DIRECTORY is parsed for its pEAT to match with syscall signature { 0x4c,0x8b,0xd1,0xb8 }. The matching addresses are printed on console

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published