SkillAgentSearch skills...

EasySafe

Known ring3 memory protections that can be handled at a simple level.

Install / Use

/learn @illegal-instruction-co/EasySafe
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

<img src="https://github.com/illegal-instruction-co/EasySafe/blob/main/assets/easysafe.png?raw=true" data-canonical-src="https://github.com/illegal-instruction-co/EasySafe/blob/main/assets/easysafe.png?raw=true" width="50" height="50" /> EasySafe

<br /> Known ring3 memory protections that can be handled at a simple level.

Example usage

Check Example.cpp

Syscall hooking

  1. Add a syscall hook
  2. Specify the action to be taken when the syscall you hooked is called. You can spoof the R10 and RAX values. (RAX is the value returned.)
  3. If syscalls are not invoked safely in the process safe method, your callback will be executed.
  4. The callback is called as it appears and the RAX is spoofed.

LoadLibrary protection

There are many ways to inject a dynamic link library using LoadLibrary in the process.

In either case, LoadLibrary will reference LdrLoadDll, which is still an internal function. In EasySafe, you can add certain dlls to the allowlist and call your callback without loading the rest.

Related Skills

View on GitHub
GitHub Stars67
CategoryDevelopment
Updated1mo ago
Forks26

Languages

C++

Security Score

95/100

Audited on Mar 6, 2026

No findings