Overview
SysWhispers4 provides 8 function presets that group commonly-used NT functions for specific offensive security tasks. Each preset is optimized for a particular technique or workflow.Available Presets
| Preset | Functions | Primary Use Case |
|---|---|---|
common | 25 | General process/thread/memory operations |
injection | 20 | Process and shellcode injection |
evasion | 15 | AV/EDR evasion and detection bypass |
token | 6 | Token manipulation and privilege escalation |
stealth | 32 | Maximum evasion (injection + evasion + more) |
file_ops | 7 | File I/O via NT syscalls |
transaction | 7 | Process doppelganging / transactional NTFS |
all | 64 | Every supported function |
List All Presets
Preset: common
Description: General process/thread/memory operations — the recommended starting point.
Use cases:
- Memory allocation and manipulation
- Thread creation and management
- Process querying
- General-purpose NT API operations
Included Functions (25)
Memory Operations (6)
NtAllocateVirtualMemory— Allocate memory in processNtFreeVirtualMemory— Free allocated memoryNtWriteVirtualMemory— Write to process memoryNtReadVirtualMemory— Read from process memoryNtProtectVirtualMemory— Change memory protectionNtQueryVirtualMemory— Query memory region information
Thread Operations (7)
NtCreateThreadEx— Create thread in processNtOpenThread— Open handle to threadNtSuspendThread— Suspend thread executionNtResumeThread— Resume suspended threadNtGetContextThread— Get thread context (registers)NtSetContextThread— Set thread contextNtTerminateThread— Terminate thread
Process Operations (4)
NtOpenProcess— Open handle to processNtTerminateProcess— Terminate processNtQueryInformationProcess— Query process informationNtSetInformationProcess— Set process information
Section/Mapping (3)
NtCreateSection— Create section objectNtMapViewOfSection— Map section into processNtUnmapViewOfSection— Unmap section
Synchronization (3)
NtClose— Close handleNtDuplicateObject— Duplicate handleNtWaitForSingleObject— Wait for object signal
Miscellaneous (2)
NtQuerySystemInformation— Query system informationNtDelayExecution— Sleep/delay execution
Example Usage
Preset: injection
Description: Functions for process injection via threads, APC, and section mapping.
Use cases:
- Classic shellcode injection (VirtualAlloc → WriteProcessMemory → CreateRemoteThread pattern)
- APC injection
- Section-based injection (manual mapping)
- Thread hijacking
Included Functions (20)
Memory (5)
NtAllocateVirtualMemoryNtFreeVirtualMemoryNtWriteVirtualMemoryNtReadVirtualMemoryNtProtectVirtualMemory
Thread (6)
NtCreateThreadEx— Create remote threadNtOpenThreadNtSuspendThreadNtResumeThreadNtGetContextThreadNtSetContextThread
Process (2)
NtOpenProcess
Section/Mapping (3)
NtCreateSectionNtMapViewOfSectionNtUnmapViewOfSection
APC Injection (4)
NtQueueApcThread— Queue user-mode APCNtQueueApcThreadEx— Extended APC queuingNtAlertResumeThread— Resume and alert thread (execute APC)NtTestAlert— Test and execute pending APCs
Handle (1)
NtClose
Example: Classic Injection
Preset: evasion
Description: Functions useful for AV/EDR evasion, process querying, and detection bypass.
Use cases:
- Querying process/thread information to detect EDR presence
- Memory manipulation for evasion
- Dynamic unhooking support
- Anti-analysis techniques
Included Functions (15)
Process Querying (4)
NtQueryInformationProcess— Query process info (PEB, debug port, etc.)NtSetInformationProcess— Set process infoNtQueryInformationThread— Query thread infoNtSetInformationThread— Set thread info
System/Memory Querying (3)
NtQuerySystemInformation— Query system info (processes, modules)NtQueryVirtualMemory— Query memory regionsNtSetInformationVirtualMemory— Set memory info
Memory Protection (1)
NtProtectVirtualMemory— Change protection (for unhooking)
Section/Mapping (3)
NtOpenSection— Open existing section (e.g.,\KnownDlls\ntdll.dll)NtMapViewOfSection— Map clean ntdll for unhookingNtUnmapViewOfSection— Unmap section
Handle Operations (2)
NtDuplicateObject— Duplicate handlesNtClose
Process Control (2)
NtOpenProcessNtTerminateProcess— Terminate detected EDR processNtFlushInstructionCache— Flush I-cache after unhooking
Example: Detect Debugger
Preset: token
Description: Token manipulation functions for privilege escalation and impersonation.
Use cases:
- Token duplication
- Privilege escalation (SeDebugPrivilege, etc.)
- Thread impersonation
- Token querying
Included Functions (6)
NtOpenProcessToken— Open process tokenNtOpenThreadToken— Open thread tokenNtQueryInformationToken— Query token informationNtAdjustPrivilegesToken— Enable/disable privilegesNtDuplicateToken— Duplicate tokenNtImpersonateThread— Impersonate thread’s security context
Example: Enable SeDebugPrivilege
Preset: stealth
Description: Maximum evasion — combines injection, evasion, and unhooking support functions.
Use cases:
- Red team operations requiring maximum stealth
- Advanced malware analysis evasion
- Combined injection + evasion workflows
Included Functions (31)
Combines:- All
injectionpreset functions - All
evasionpreset functions - Additional helper functions:
NtContinue— Exception handlingNtDelayExecution— SleepNtWaitForSingleObject— Synchronization
Example: Maximum Stealth Workflow
Preset: file_ops
Description: File I/O operations via NT syscalls.
Use cases:
- Reading/writing files without Win32 API
- Bypassing file access hooks
- Low-level file manipulation
Included Functions (7)
NtCreateFile— Create or open fileNtOpenFile— Open existing fileNtWriteFile— Write to fileNtReadFile— Read from fileNtDeleteFile— Delete fileNtQueryObject— Query object informationNtClose— Close handle
Example: Write File via Syscall
Preset: transaction
Description: Transactional NTFS functions for process doppelganging and hollowing.
Use cases:
- Process doppelganging (create process from transacted file)
- Transactional file operations (rollback on failure)
- Advanced process creation evasion
Included Functions (7)
Transaction (3)
NtCreateTransaction— Create TxF transactionNtRollbackTransaction— Rollback transactionNtCommitTransaction— Commit transaction
Process Creation (3)
NtCreateSection— Create section from transacted fileNtCreateProcessEx— Create process from sectionNtCreateThreadEx— Create initial thread
Handle (1)
NtClose
Example: Process Doppelganging Flow
Preset: all
Description: All 64 supported functions.
Use cases:
- Maximum flexibility
- Framework development
- Complete NT API syscall coverage
Included Functions (64)
All functions from all presets, plus:NtAllocateVirtualMemoryEx— Extended allocationNtSuspendProcess/NtResumeProcess— Process suspensionNtWaitForMultipleObjects— Wait for multiple objectsNtSignalAndWaitForSingleObject— Atomic signal+waitNtCreateEvent/NtSetEvent/NtResetEvent— Event objectsNtCreateTimer/NtSetTimer— Timer objectsNtAlertThread— Alert thread- And more…
Combining Presets
Merge multiple presets:- All 25
commonfunctions - All 6
tokenfunctions - Duplicates automatically removed
Adding Custom Functions
Combine preset with specific functions:injection functions + the 2 additional functions.
Recommended Combinations
Red Team Shellcode Injection
Token Abuse + Evasion
File Operations + Anti-Debug
Maximum Stealth Everything
Next Steps
Basic Usage
Learn basic workflows and patterns
Advanced Evasion
Explore all evasion configurations
