Syshooker
Dynamic anti-evasion via syscall hooking (using https://github.com/everdox/InfinityHook)
Install / Use
/learn @okmada123/SyshookerREADME
Syshooker
Kernel driver that allows system call hooking using InfinityHook. Developed as an anti-anti-debug solution for dynamic malware analysis.
Use at your own risk.

Syshooker currently allows you to hide the following artifacts:
- Files
- Running processes
- Windows registry keys
Getting started
Compile
To compile the solution, the following components were used:
- Microsoft Visual Studio Community 2022 (64-bit), version 17.11.4
- Windows SDK (10.0.26100)
- Windows Driver Kit (10.0.26100)
- Windows Driver Kit extension for Visual Studio
Windows SDK and Windows Driver Kit have to have the same version. Newer than the one that we have used should probably be okay. The latest version can be downloaded here: https://learn.microsoft.com/en-us/windows-hardware/drivers/download-the-wdk.
Loading the driver
[!WARNING] We do not recommend installing and loading the driver on your host machine. It is advised to use a virtual machine instead.
Suitable Windows 10 build
The InfinityHook exploit should work up to build 1909 of Windows 10. The solution has been developed and tested on Windows 10 version 1809, build 17763.1.
The ISO image for the version that we have used was downloaded from https://os.click/en.
Test signing mode
For security reasons, Windows won't let you load unsigned kernel driver unless you enable testsigning mode (run as an administrator):
bcdedit /set testsigning on
After running this command, rebooting is necessary.
Creating the service
Copy the compiled driver (.sys) to the VM.
Create the driver service:
sc create syshooker type= kernel binPath= "c:\path\to\your\driver.sys"
- note the spaces after the equal sign
Loading (running) the driver
(run as administrator)
sc start syshooker
# or in powershell
sc.exe start syshooker
If all went well, the output should look like this:

Stopping the driver
(run as administrator)
sc stop syshooker
# powershell
sc.exe stop syshooker
Client
Runtime modification of hiding settings is possible using the client program. Examples:
Syshooker-Client.exe add file example.txt # hide example.txt
Syshooker-Client.exe remove process explorer.exe # hide explorer.exe
Syshooker-Client.exe toggle # toggle syscall hooking
Syshooker-Client.exe read # print current settings
Related Skills
node-connect
343.1kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
90.0kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
343.1kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
343.1kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
