Skip to content

NTDLL unhooking from suspended process via indirect syscalls.

License

Notifications You must be signed in to change notification settings

jakobfriedl/IndirectUnhook

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

IndirectUnhook

NTDLL Unhooking via retrieving a clean version of ntdll.dll from a suspended process, utilizing indirect syscalls using the HellsHall technique.

Features

  • NTDLL Unhooking from suspended process
  • Full implementation using indirect syscalls with HellsHall
  • Process creation using NtCreateUserProcess
  • API Hashing

Screenshots

Testing with hooked NtProtectVirtualMemory function:

IndirectUnhook

About

NTDLL unhooking from suspended process via indirect syscalls.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published