Barracudach / CallStack-SpooferLinks
This tool will allow you to spoof the return addresses of your functions as well as system functions.
☆505Updated 2 years ago
Alternatives and similar repositories for CallStack-Spoofer
Users that are interested in CallStack-Spoofer are comparing it to the libraries listed below
Sorting:
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆347Updated 3 years ago
- Simple Kernelmode DLL Injector with Manual mapping☆300Updated last year
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆437Updated 3 years ago
- ☆313Updated 2 months ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆341Updated 3 years ago
- Kernel mode to user mode dll injection☆276Updated 4 years ago
- Fumo Loader - All in one kernel-based DLL injector☆316Updated 7 months ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆269Updated last year
- State of the art DLL injector that took 20 minutes to make☆218Updated last year
- Windows Kernel inject (no module no thread)☆277Updated 2 years ago
- A mapper that maps shellcode into loaded large page drivers