Skip to content

Bypassing Event Tracing for Windows (ETW) with CSharp

Notifications You must be signed in to change notification settings

Gurpreet06/ETW-Patcher

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

ETW-Patcher

A simple C++ script that first checks if NtProtectVirtualMemory and NtAllocateVirtualMemory are hooked or not. Then it loads the ntdll.dll with LoadLibrary and gets the address of the function EtwEventWrite using GetProcAddress. Finally, it writes the patch bytes into the process.

Usage

  • Without ETW bypass. image

  • With ETW bypass. image