Darkratos / Spoofed-Call
A wrapper class to hide the original calling address of a function
☆55Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Spoofed-Call
- ☆33Updated 4 years ago
- ☆70Updated 2 years ago
- ☆28Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆65Updated 3 years ago
- A Simple Example☆20Updated 5 years ago
- PsSetCreateProcessNotifyRoutine bypass proof-of-concept for manual mapped drivers☆31Updated 3 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Updated 5 years ago
- Hiding a system thread against conventional means of detection☆35Updated 4 years ago
- ☆41Updated 3 years ago
- fecurity executor from factory☆33Updated 2 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- ☆26Updated 2 years ago
- clearing traces of a loaded driver☆44Updated 2 years ago
- Mapping your code on a 0x1000 size page☆69Updated 2 years ago
- Detect removed thread from PspCidTable.☆68Updated 2 years ago
- ☆43Updated 3 years ago
- Old way for blocking NMI interrupts☆25Updated 2 years ago
- x64 manual mapper using inline syscalls☆5Updated 3 years ago
- Discarded Section Manual Map☆66Updated 4 years ago
- 将驱动映射到会话空间☆33Updated 2 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- ☆18Updated 3 years ago
- C/C++ example of InjectMouseInput function☆31Updated 3 years ago
- mouseclassservicecallback detection via hook☆48Updated 2 years ago