Skip to content
#

direct-syscalls

Here are 18 public repositories matching this topic...

A modern zero-allocation C++23 library for working with low-level Windows within user-space. Iteration over loaded modules via PEB, EAT iteration, lazy imports, syscalls, and more.

  • Updated Apr 26, 2026
  • C++

BypassETWDirectSyscallShellcodeLoader is a robust C++14 application designed for secure and stealthy shellcode execution. It incorporates advanced anti-debugging and anti-sandboxing techniques to evade detection and analysis, making it suitable for penetration testing and security research.

  • Updated Feb 14, 2025
  • C++

Improve this page

Add a description, image, and links to the direct-syscalls topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the direct-syscalls topic, visit your repo's landing page and select "manage topics."

Learn more