Indirect Syscall invocation via thread hijacking
-
Updated
May 5, 2023 - C
8000
Indirect Syscall invocation via thread hijacking
NTAPI hook bypass with (semi) legit stack trace
SysWhispers/DirectSyscall Successor — Dynamic Syscall Dispatch Engine with Runtime Debugger & Anti-Tamper. Bypasses Userland Hooks & Kernel Callbacks
CODM-Hook-Bypass
Unsignatured Detours | Runtime Advanced Hooking & Anti-Hook-IAT API Resolution
bgmi mod menu hook bypass code
Add a description, image, and links to the hook-bypass topic page so that developers can more easily learn about it.
To associate your repository with the hook-bypass topic, visit your repo's landing page and select "manage topics."