🚨 Proof of Concept to bypass NTAPI hooking using @maldevacademy's indirect syscalls technique.
- Indirect Syscall Bypass via HellsHall (Thanks to @maldevacademy)
- InetSim Detection – detects sandbox and halts execution if triggered
- API Hashing – for stealthy function resolution
- IAT Obfuscation – evades static analysis tools
- Debugger Check – anti-debug trickery
- XOR-Based Decryption – runtime decryption for payload execution
Encrypt your payload:
XOR.exe <file_path> <key>Launch the loader:
Loader.exe