We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 7c9bc90 commit f789f21Copy full SHA for f789f21
README.md
@@ -0,0 +1,12 @@
1
+# memfuck
2
+A PoC designed to bypass all usermode hooks in a WoW64 environment.
3
+
4
+MemFuck will unmap everything. Then you are free to execute code in an environment free of user-mode hooks.
5
6
+Just don't rely on Rtl* functions or anything other than Nt* functions :)
7
8
+To look up syscall numbers for your system, please visit: https://j00ru.vexillium.org/syscalls/nt/64/
9
10
+Tested on Windows 10 x64 Build 19041.508
11
12
+winternl.com
0 commit comments