shellcode loader that uses indirect syscalls written in D Lang The loader bypasses user-mode hooks by resolving system calls manually from NTDLL using a hash-based method.
Links
- Source: https://github.com/EvilBytecode/EByte-Shellcode-Loader
- JSON API: repos.ecosyste.ms
-
PURL:
pkg:github/EvilBytecode/EByte-Shellcode-Loader
Repository Details
- Stars 9
- Forks 1
- Open issues 0
- License apache-2.0
- Language D
- Size 142 KB
- Created at over 1 year ago
- Updated at 11 months ago
- Pushed at over 1 year ago
- Last synced at 10 months ago
- Dependencies parsed at Pending