Skip to content

waawaa/Unhook_from_memory

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Unhook_from_memory

Remove EDR hooks established in NTDLL by EDRs.


1. Create suspended process (32 or 64 bits)
2. Parse the _PEB structure
3. Look for PE32 magic bytes
4. Iterate over all loaded modules in the suspended process.
The first will be the application (suspended) module.
The second will be the NTDLL
5. Look for .text section in the NTDLL loaded in the suspended process
6. Copy the .text section from the suspended process to the target process (implant).
7. Have fun!!


About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages