SkillAgentSearch skills...

VirtualProtectHookBypass

Bypass WinAPI Hook Using copy function

Install / Use

/learn @ekdms05/VirtualProtectHookBypass
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

VirtualProtectHookBypass

Bypass IAT Hook via Directly syscall

How can Directly Syscall ?

  • Copy Function via using assembly

  • Just directly syscalling ZwProtectVirtualMemory instead of calling the export to syscall in ntdll.dll.

  • it can't not be hooked by anything except the Hooking man in kernelland

  • This example is for x86.

if you want to use on x64

  1. Check masm Compile option.
  2. make a .asm file on project
  3. code on .asm file
  4. Profit

[ Ntdll.dll ] ZwProtectVirtualMemory

image

[ Kernel.dll ] VirtualProtect

image

Credit

me (Ekdms95) and I will give some credit for sexyyume

View on GitHub
GitHub Stars52
CategoryDevelopment
Updated1mo ago
Forks17

Languages

C++

Security Score

95/100

Audited on Feb 19, 2026

No findings