Your syscall factory, zero boilerplate.

Sysplant generates ready-to-compile Windows syscall stubs in C, C++, NIM, or Rust. Pick one of 7 gate iterators, one of 4 caller methods, and get a drop-in source file — in a single command.

Everything you need to bypass EDR syscall hooks

    7 Gate Iterators
    Hell's Gate, Halo's Gate, Tartarus' Gate, FreshyCalls, SysWhispers2/3, and Canterlot's Gate — pick the technique that fits your target environment.
    4 Caller Methods
    Direct, indirect, random, and egg-hunter execution — control exactly how your syscall instruction gets invoked at runtime.
    4 Output Languages
    Generate native stubs in C, C++, NIM, or Rust. Each output file is drop-in ready for your cross-compiler pipeline.
    CLI & Python Library
    Use the sysplant CLI for one-shot generation, or embed the Sysplant class directly in your Python toolchain.
    MCP Server
    AI-native integration via Model Context Protocol — generate stubs, scan code for Nt functions, and fetch prototypes straight from your LLM.
    Symbol Scrambling
    Randomize all 23 internal SPT_* symbol names at generation time to defeat static signature matching in binary analysis tools.
Copyright © 2026