Syscall Labs
  • Home
  • About
e-fin

e-fin

Internal NTDLL Functions for Shellcode Execution

Malware developers are always looking for new way to execute shellcode. Commonly used Win32 APIs are often hooked or otherwise monitored by an EDR. A classic method that does not require any Win32 APIs is local execution through a function pointer cast as shown below. void *exec = VirtualAlloc(0, shellcodeSize,
29 Apr 2026 6 min read
Page 1 of 1
Syscall Labs © 2026
Powered by Ghost