inline_syscall
Inline syscalls, hidden calls : - Resolves syscall IDs dynamically at runtime - Uses PE parsing to avoid runtime memory patching - Written in modern C++ with MASM integration - Educational tool for understanding Windows internals ⚠️ For research and educational purposes only
How to download and setup inline_syscall
Open terminal and run command
git clone https://github.com/xxFURYWOLFxx/inline_syscall.git
git clone is used to create a copy or clone of inline_syscall repositories.
You pass git clone a repository URL. it supports a few different network protocols and corresponding URL formats.
Also you may download zip file with inline_syscall https://github.com/xxFURYWOLFxx/inline_syscall/archive/master.zip
Or simply clone inline_syscall with SSH
[email protected]:xxFURYWOLFxx/inline_syscall.git
If you have some problems with inline_syscall
You may open issue on inline_syscall support forum (system) here: https://github.com/xxFURYWOLFxx/inline_syscall/issuesSimilar to inline_syscall repositories
Here you may see inline_syscall alternatives and analogs
cli x64dbg debug-bundle mitmproxy reactotron Under-the-hood-ReactJS XCGLogger pwndbg boxx netfox debug platformio-core open-c-book PPLKiller node-in-debugging CocoaDebug augury react-native-slowlog birdseye tensorflow-talk-debugging clockwork stern ndb Android-Debug-Database post-mortems debugging-stories pyrasite ResponseDetective gef Watchdog