Direct System Calls For Hackers (EDR Evasion)

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 ก.ย. 2024
  • In this video we take the systemcalls code we wrote in the last video and we upgrade it to use direct systems calls. Then we review the applicatio n and show how the direct system calls can help to avoid usermode hooking by debugging and hooking our new application.
    Don't forget to like, share, and subscribe for more content on malware development and cybersecurity. Let's dive deep into the world of malicious code together!
    Code from the video found at: github.com/yti...
    Github: github.com/yti...
    Disclaimer: The content in this video is for educational purposes only and not intended to encourage or support any illegal activities. The creator cannot be held responsible for the misuse of the information provided. Viewers are advised to ensure their actions are lawful and safe.

ความคิดเห็น • 5

  • @detective5253
    @detective5253 วันที่ผ่านมา

    yooo, that was perfect! good mic quality, deep explanation and right on time content, i just love it

  • @ytg6663
    @ytg6663 6 วันที่ผ่านมา

    Excellent! Very informative content sir.

  • @hansqid
    @hansqid 5 วันที่ผ่านมา

    Thanks!

  • @HAMETE
    @HAMETE 6 วันที่ผ่านมา

    very cool. Thank you

  • @ytg6663
    @ytg6663 6 วันที่ผ่านมา

    May i request heap exploitation in usermode programs alongwith its heap manager allocator internals?