2217936322 / VirtualProtectHookBypass

Bypass WinAPI Hook Using copy function

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

VirtualProtectHookBypass

Bypass IAT Hook via Directly syscall

How can Directly Syscall ?

  • Copy Function via using assembly

  • Just directly syscalling ZwProtectVirtualMemory instead of calling the export to syscall in ntdll.dll.

  • it can't not be hooked by anything except the Hooking man in kernelland

  • This example is for x86.

if you want to use on x64

  1. Check masm Compile option.
  2. make a .asm file on project
  3. code on .asm file
  4. Profit

[ Ntdll.dll ] ZwProtectVirtualMemory

image

[ Kernel.dll ] VirtualProtect

image

Credit

me (Ekdms95) and I will give some credit for sexyyume

About

Bypass WinAPI Hook Using copy function


Languages

Language:C++ 100.0%