SkillAgentSearch skills...

MySyscall

Example of hijacking system calls via function pointer tables

Install / Use

/learn @anzelesnik/MySyscall
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

MySyscall

This project demonstrates the use of apfnSimpleCall, a function pointer table inside win32kfull.sys (which is only partially protected by PatchGuard), to hijack a specific group of system calls. This allows a potentional attacker to maintain stealthier communication between a user mode application and kernel code.

Writeup

https://lesnik.cc/mysyscall-hijacking-windows-system-calls-for-personal-use/

View on GitHub
GitHub Stars31
CategoryDevelopment
Updated11mo ago
Forks19

Languages

C++

Security Score

67/100

Audited on Apr 12, 2025

No findings