SyscallPack icon indicating copy to clipboard operation
SyscallPack copied to clipboard

BOF and Shellcode for full DLL unhooking using dynamic syscalls

SyscallPack

Beacon Object File and Shellcode for full DLL unhooking.

  1. Get handle to hooked DLL
  2. Get dynamic Syscalls for NtOpenSection and NtMapViewOfSection
  3. Load unhooked DLL from /KnownDlls/
  4. Patch hooked functions
  5. Unload unhooked DLL

unhook-PIC

Unhook ntdll.dll with shellcode. Only support for x64 atm! Convert pic exe to shellcode format with for i in $(objdump -d compiled/unhook-pic.exe |grep "^ " |cut -f2); do echo -n '\x'$i; done; echo

image-20220307173659974

unhook-BOF

Unhook all hooked functions for a specified DLL

image-20220307173659974

Acknowledgements