metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Rex::Payloads::Win32::Kernel::Stager.sud_syscall_hook
XP SP2/2K3 SP1 ONLY Returns a kernel-mode stager that transitions from r0 to r3 by placing code in an unused portion of SharedUserData and then pointing the SystemCall attribute to that unused portion. This has the effect of causing the custom code to be called every time a user-mode process tries to make a system call. The returned payload also checks to make sure that it's running in the context of lsass before actually running the embedded payload.
Edit
git clone [email protected]:rapid7/metasploit-framework.git
cd metasploit-framework
open lib/rex/payloads/win32/kernel/stager.rb
Contribute
# Make a new branchgit checkout -b -your-name--update-docs-Rex--Payloads--Win32--Kernel--Stager-sud_syscall_hook-for-pr
# Commit to gitgit add lib/rex/payloads/win32/kernel/stager.rbgit commit -m "better docs for Rex::Payloads::Win32::Kernel::Stager.sud_syscall_hook"
# Open pull requestgem install hub # on a mac you can `brew install hub`
hub fork
git push <your name> -your-name--update-docs-Rex--Payloads--Win32--Kernel--Stager-sud_syscall_hook-for-pr
hub pull-request
# Celebrate!