Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"sysplant": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
SysPlant is a python generation tool of the currently known syscall hooking methods. It currently supports following gates (aka: iterators):
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security
An evil MCP server used for redteam testing
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
Signed receipts for agent, API, and MCP interactions. Portable and offline-verifiable.
IAM Policy Autopilot is an open source static code analysis tool that helps you quickly create baseline AWS IAM policies that you can refine as your application evolves. This tool is available as a command-line utility and MCP server for use within AI coding assistants for quickly building IAM policies.
MCP Security Weekly
Get CVE alerts and security updates for Sysplant and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Your Syscall Factory (feat. Canterlot's Gate)
SysPlant is a python generation tool of the currently known syscall hooking methods. It currently supports following gates (aka: iterators):
:warning: DISCLAIMER
Please only use this tool on systems you have permission to access.
Usage is restricted to Pentesting or Education only.
All credits are based on my own research, please feel free to claim any method if I made mistakes...
This personal project aims to be a simple tool to better understand & generate different syscall retrieval methods, and being able to play with direct / indirect / egg_hunter syscall stub. The first goal was to get my hands into NIM and then it overflow to C, C++ and Rust :wink: ...
SysPlant has been developped for Linux users, some stuff might be broken within Windows or Mac. PR are welcome if you found anything that does not work as expected.
| Language | Status | Cross-compile from Linux |
|---|---|---|
| NIM | :white_check_mark: Stable | `nim c - |