# Page Not Found

The URL `miscellaneous-reversing-forensics/windows-kernel-internals/hooking-syscalls-in-windows-64-bit` does not exist.

You might be looking for one of these pages:
- [System Service Descriptor Table - SSDT](https://www.ired.team/miscellaneous-reversing-forensics/windows-kernel-internals/glimpse-into-ssdt-in-windows-x64-kernel.md)
- [ETW: Event Tracing for Windows 101](https://www.ired.team/miscellaneous-reversing-forensics/windows-kernel-internals/etw-event-tracing-for-windows-101.md)
- [Exploring Process Environment Block](https://www.ired.team/miscellaneous-reversing-forensics/windows-kernel-internals/exploring-process-environment-block.md)
- [Instrumenting Windows APIs with Frida](https://www.ired.team/miscellaneous-reversing-forensics/windows-kernel-internals/instrumenting-windows-apis-with-frida.md)
- [Writing a Custom Bootloader](https://www.ired.team/miscellaneous-reversing-forensics/windows-kernel-internals/writing-a-custom-bootloader.md)

## How to find the correct page

1. **Browse the full index**: [/sitemap.md](https://www.ired.team/sitemap.md) - Complete documentation index
2. **View the full content**: [/llms-full.txt](https://www.ired.team/llms-full.txt) - Full content export

## Tips for requesting documentation

- For markdown responses, append `.md` to URLs (e.g., `/miscellaneous-reversing-forensics/windows-kernel-internals/glimpse-into-ssdt-in-windows-x64-kernel.md`)
- Use `Accept: text/markdown` header for content negotiation