Rust-for-Malware-Development

RecycledGate πŸ¦€

This is just another implementation of Hellsgate + Halosgate/Tartarusgate.

Recycledgate

This probably bypasses some EDR trying to detect abnormal systemcalls.

This combines elements of Hells Gate (extracting syscall numbers from NTDLL stubs) and Halos Gate (searching nearby stubs if the target is hooked) to dynamically resolve and invoke NT syscalls.

The key evasion aspect is jumping to recycled syscall; ret sequences within ntdlls loaded memory, ensuring the syscall instruction executes from NTDLLs address space bypassing EDR hooks on exports while avoiding inline/direct β€œsyscall” in your binary, which can trigger detections in syscall-detect tool.

I have made some changes to the logic and code that support compatibility.

Download RecycledGate PoC: Downlaod

Credits / Resources