Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

mand0hunt/SyscallsExample

Open more actions menu
 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
6 Commits
 
 
 
 
 
 
 
 

Repository files navigation

SyscallsExample

Simple project using syscalls (via SysWhispers2) to execute MessageBox shellcode in a target process.

This doesn't use Windows API calls to allocate memory, create the thread etc so bypasses some detections and can make it harder for investigators and reverse engineers to determine what is going on.

Accompanying blog post: https://jmpesp.me/malware-analysis-syscalls-example/

About

Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Assembly 65.9%
  • C 32.7%
  • C++ 1.4%
Morty Proxy This is a proxified and sanitized view of the page, visit original site.