Skip to content

Simple PoC to locate hooked functions by EDR in ntdll.dll

Notifications You must be signed in to change notification settings

fin3ss3g0d/HookFinder

Repository files navigation

HookFinder

A simple PoC to locate hooked functions within ntdll.dll to further EDR evasion research.

About

This PoC uses the same checks that TartarusGate uses in order to find hooked system calls. Breaking it down further, the first and third bytes of a function are checked for the bytes matching a JMP instruction. If either are a match, this is a good indicator that the function is hooked.

Demo

The below screenshot is a demo running the program against an endpoint with EDR.

demo

A Word About Sponsorship

On July 15, 2023 I created my GitHub Sponsors sponsorship tiers. Be sure to check them out to find out what kind of perks you could be getting!

Credits

Code heavily borrowed from TartarusGate.

About

Simple PoC to locate hooked functions by EDR in ntdll.dll

Resources

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

 

Packages

No packages published

Languages