Skip to content

Latest commit

 

History

History
23 lines (17 loc) · 865 Bytes

README.md

File metadata and controls

23 lines (17 loc) · 865 Bytes

IAT Camouflage 🦀

Overview

By working with direct/indirect syscall and removing the C runtime library, our binary will generally not have IAT exports, which can give it a malicious appearance. The technique in question aims to "trick" the compiler into including some APIs in the export process without them actually being executed at runtime. This helps mitigate the suspicious appearance of the binary, making it less likely to be marked as malicious.

Usage

You can run with cargo run or the compiled binary directly:

cargo run
target/release/iat_camouflage.exe