Nim-HalosGate-Injector
Nim-HalosGate-Injector copied to clipboard
Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.
Nim-HalosGate-Injector
My Nim implementation of the most common shellcode injector, using HalosGate to retrieve system call opcodes dynamically from NTDLL even when there are EDR API Hooks in place.
It relies heavily in other implementations, so huge thanks to SEKTOR7 1 for implementing this technique and @am0nsec and @RtlMateusz for creating the Hell's Gate paper in first place 2. Thanks also to @zimawhit3 for his Nim Hell's gate implementation 3 :)
Usage
Its usage is pretty simple, just compile the binary with nim:
nim c -d=mingw --app=console --cpu=amd64 HalosGate.nim
And run it in the target machine specifying the PID of the process in which you want to inject the shellcode:
./HalosGate.exe <PID>