Undetectable System Call Invocation
A C++20 policy-based framework for crafting protected syscalls with compile-time flexibility. Mix and match allocation, stub generation, and parsing strategies for ultimate operational security.
Quick Start
Get up and running with syscalls-cpp in three simple steps
Install via vcpkg
include directory to your project’s include paths for manual integration.Include the header
Explore by Topic
Dive into the core concepts and learn how to customize syscalls-cpp for your needs
Core Concepts
Allocation Policies
Stub Generation
Custom Policies
Key Features
Why developers choose syscalls-cpp for advanced Windows security research
Policy-Based Design
Mix and match allocation, stub generation, and parsing strategies at compile-time for maximum flexibility.
Hook Detection & Evasion
Automatically detects function hooks and resolves syscall numbers from neighboring functions using improved halo gates.
SEC_NO_CHANGE Protection
Allocate syscall stubs in memory sections with SEC_NO_CHANGE flag to prevent runtime patching attempts.
Compile-Time Hashing
String identifiers are hashed at compile-time using consteval functions for operational security and obfuscation.
Resources
Examples
API Reference
GitHub Repository
Ready to Build Undetectable Syscalls?
Start exploring the policy-based framework and craft your custom syscall strategies today.
Get Started Now