Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

getcode2git/SharpCall

Open more actions menu
 
 

Repository files navigation

SharpCall

Simple proof of concept code that allows you to execute direct system calls in C# by utilizing unmanaged code to bypass EDR and API Hooking.

This Proof of Concept is directly related to the following blog posts:

File Structure:

  • Native.cs: Contains all the Native Window API function calls, as well as the necessary structures, and flag enumerators.
  • Syscalls.cs: Contains the delegate definition and delegate implementation used to execute our syscall assembly from unmanaged memory.
  • Program.cs: Main program application that utilizes our implemented syscall delegate to execute the syscall.

About

Simple PoC demonstrating syscall execution in C#

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C# 100.0%
Morty Proxy This is a proxified and sanitized view of the page, visit original site.