C485 / ReturnAddressHiderLinks
Simple header only library to change return address on current stack frame.
☆24Updated 8 years ago
Alternatives and similar repositories for ReturnAddressHider
Users that are interested in ReturnAddressHider are comparing it to the libraries listed below
Sorting:
- win32/x64 obfuscate framework☆32Updated 6 years ago
- Polymorphic Stub Creator☆34Updated 8 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- Some crazy PE executables protection kernel driver☆18Updated 5 years ago
- Library for using direct system calls☆35Updated 5 months ago
- ☆11Updated 7 years ago
- fork HoShiMin Avanguard☆20Updated 6 years ago
- using gpuz to load driver☆35Updated 6 years ago
- ☆16Updated 5 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 5 years ago
- Analysing and defeating PatchGuard universally☆35Updated 4 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- Translates WinDbg "dt" structure dump to a C structure☆13Updated 4 years ago
- ☆24Updated 6 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Updated 7 years ago
- A POC for Windows Extension Host hooking☆22Updated 6 years ago
- RET / JMP RBX call spoofer☆10Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- Injector with kernel power☆16Updated 4 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Updated 10 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Updated 7 years ago
- Windows Console Monitor☆34Updated 6 years ago
- Remote memory library in C++17.☆31Updated 7 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 6 years ago