Skip to content

BOF and Shellcode for full DLL unhooking using dynamic syscalls

Notifications You must be signed in to change notification settings

come2darkside/SyscallPack

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

SyscallPack

Beacon Object File and Shellcode for full DLL unhooking.

  1. Get handle to hooked DLL
  2. Get dynamic Syscalls for NtOpenSection and NtMapViewOfSection
  3. Load unhooked DLL from /KnownDlls/
  4. Patch hooked functions
  5. Unload unhooked DLL

unhook-PIC

Unhook ntdll.dll with shellcode. Only support for x64 atm! Convert pic exe to shellcode format with for i in $(objdump -d compiled/unhook-pic.exe |grep "^ " |cut -f2); do echo -n '\x'$i; done; echo

image-20220307173659974

unhook-BOF

Unhook all hooked functions for a specified DLL

image-20220307173659974

Acknowledgements

About

BOF and Shellcode for full DLL unhooking using dynamic syscalls

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 98.0%
  • Makefile 1.2%
  • Assembly 0.8%