VirtualProtectHookBypass
Bypass WinAPI Hook Using copy function
Install / Use
/learn @ekdms05/VirtualProtectHookBypassREADME
VirtualProtectHookBypass
Bypass IAT Hook via Directly syscall
How can Directly Syscall ?
-
Copy Function via using assembly
-
Just directly syscalling ZwProtectVirtualMemory instead of calling the export to syscall in ntdll.dll.
-
it can't not be hooked by anything except the Hooking man in kernelland
-
This example is for x86.
if you want to use on x64
- Check masm Compile option.
- make a .asm file on project
- code on .asm file
- Profit
[ Ntdll.dll ] ZwProtectVirtualMemory

[ Kernel.dll ] VirtualProtect

Credit
me (Ekdms95) and I will give some credit for sexyyume
