Your syscall factory, zero boilerplate.
Sysplant generates ready-to-compile Windows syscall stubs in C, C++, NIM, or Rust. Pick one of 7 gate iterators, one of 4 caller methods, and get a drop-in source file — in a single command.
Everything you need to bypass EDR syscall hooks
7 Gate Iterators
Hell's Gate, Halo's Gate, Tartarus' Gate, FreshyCalls, SysWhispers2/3, and Canterlot's Gate — pick the technique that fits your target environment.
4 Caller Methods
Direct, indirect, random, and egg-hunter execution — control exactly how your syscall instruction gets invoked at runtime.
4 Output Languages
Generate native stubs in C, C++, NIM, or Rust. Each output file is drop-in ready for your cross-compiler pipeline.
CLI & Python Library
Use the sysplant CLI for one-shot generation, or embed the Sysplant class directly in your Python toolchain.
MCP Server
AI-native integration via Model Context Protocol — generate stubs, scan code for Nt functions, and fetch prototypes straight from your LLM.
Symbol Scrambling
Randomize all 23 internal SPT_* symbol names at generation time to defeat static signature matching in binary analysis tools.