Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

aeverj/NimSyscalls

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

4 Commits

Repository files navigation

NimSysCalls

从挂起进程内存中获取干净的ntdll副本,使用syscall绕过AV/EDR

简体中文说明 | English README

更新

  • 20220315:获取ntdll中syscall地址,然后调用。能够绕过对syscall指令执行的位置的检查

介绍

  1. 创建一个挂起的进程
  2. 获取ntdll的基址
  3. 从挂起的进程中获取ntdll内容复制到本进程
  4. 保存syscall的调用代码
  5. 执行syscall调用

如何使用

  1. 下载仓库到本地
  2. 将需要syscall调用的函数写到 functions.txt文件中
  3. 执行 python3 NimSysCalls.py 生成一个syscalls.nim文件
  4. 编译并执行,例子在example.nim.

实例

>> nim c -d:strip --opt:size -d:release -f -r example.nim
[*] Create process notepad.exe
[*] Read clean copy of ntdll from notepad.exe and kill the process
[*] Get export function from clean copy of ntdll
[*] Start create C:\Users\pw.log
[*] Syscall code: 85
[*] NtCreateFile return: 0
[*] Create file C:\Users\pw.log success

引用

About

Direct system calls by nim

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

AltStyle によって変換されたページ (->オリジナル) /