x42en/sysplant

Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP

49
/ 100
Emerging

This tool helps cybersecurity researchers and penetration testers generate custom Windows syscall hooking code. It takes your desired syscall retrieval method and a list of Windows API functions (like NtReadVirtualMemory) as input. It then outputs ready-to-use source code in languages like C, C++, Rust, or Nim, which can be compiled into malicious payloads or defensive security tools. The primary users are red team operators, malware developers, and security educators.

126 stars.

Use this if you need to create custom, low-level Windows binaries for offensive security or malware analysis that bypass traditional user-mode API hooking and logging.

Not ideal if you are looking for a high-level API for general application development or if you do not have a strong understanding of Windows internals and defensive evasion techniques.

penetration-testing red-teaming malware-development security-research offensive-security
No Package No Dependents
Maintenance 10 / 25
Adoption 10 / 25
Maturity 16 / 25
Community 13 / 25

How are scores calculated?

Stars

126

Forks

12

Language

Nim

License

GPL-3.0

Last pushed

Mar 06, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/x42en/sysplant"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.