Barracudach / CallStack-Spoofer
This tool will allow you to spoof the return addresses of your functions as well as system functions.
☆432Updated 2 years ago
Alternatives and similar repositories for CallStack-Spoofer:
Users that are interested in CallStack-Spoofer are comparing it to the libraries listed below
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆306Updated 2 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆298Updated 3 years ago
- Memory hacking library powered by AMD SVM☆315Updated last year
- Windows Kernel inject (no module no thread)☆269Updated 2 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆393Updated 3 years ago
- A mapper that maps shellcode into loaded large page drivers☆244Updated 2 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆241Updated 5 years ago
- Kernel mode to user mode dll injection☆232Updated 3 years ago
- Hiding unsigned DLL inside a signed DLL