NUL0x4C / KnownDllUnhook

Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

KnownDllUnhook: Replace the .txt section of the current loaded modules from \KnownDlls\ to do api unhooking

How Does it Work:

  • first, it loops through the loaded dlls
  • check if the name of the loaded dll is found in \KnownDlls\ dir
  • if found, the dll will be mapped to the current process
  • then, some calculations happen ( to get the address of the .txt section of the current dll & it's size )
  • change the memory permissions on current dll's .txt to 'PAGE_EXECUTE_WRITECOPY'
  • replace the .txt section from our \KnownDlls\ dll
  • fix the memory protection back to what it was
  • unmap the \KnownDlls\ dll since it is no longer needed
  • continue the loop until all the current dlls are checked
  • all the intial syscalls ( the ones that do the unhooking ) are from Syscallslib

Demo:

image


Note that this idea isnt mine, its my implementation only ...

Based On:

About

Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs

License:MIT License


Languages

Language:C 100.0%