Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls
-
Updated
Aug 31, 2025 - Rust
Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls
Inline syscalls made for MSVC supporting x64 and WOW64
The project uses SSDT Hooking to bypass security checks during driver loading by hooking NtLoadDriver and modifying the PreviousMode flag.
[RO/Mirror] Windows XP x86-32 SSDT table hook
The project demonstrates a simple detection method for SSDT Hook in User Mode via BYOVD
This project demonstrates simply a ssdt unhooking technique via NtLoadDriver routine in Windows 11 X64.
Add a description, image, and links to the ssdt-hook topic page so that developers can more easily learn about it.
To associate your repository with the ssdt-hook topic, visit your repo's landing page and select "manage topics."