Skip to content

Latest commit

 

History

History
36 lines (18 loc) · 958 Bytes

README.md

File metadata and controls

36 lines (18 loc) · 958 Bytes

SyscallPack

Beacon Object File and Shellcode for full DLL unhooking.

  1. Get handle to hooked DLL
  2. Get dynamic Syscalls for NtOpenSection and NtMapViewOfSection
  3. Load unhooked DLL from /KnownDlls/
  4. Patch hooked functions
  5. Unload unhooked DLL

unhook-PIC

Unhook ntdll.dll with shellcode. Only support for x64 atm! Convert pic exe to shellcode format with for i in $(objdump -d compiled/unhook-pic.exe |grep "^ " |cut -f2); do echo -n '\x'$i; done; echo

image-20220307173659974

unhook-BOF

Unhook all hooked functions for a specified DLL

image-20220307173659974

Acknowledgements