paskalian / RetSpooferLinks
Spoof the return address of any function call.
☆11Updated last year
Alternatives and similar repositories for RetSpoofer
Users that are interested in RetSpoofer are comparing it to the libraries listed below
Sorting:
- Kernel Level NMI Callback Blocker☆152Updated 3 months ago
- Translate virtual addresses to physical addresses from usermode.☆71Updated last year
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- Experiment with PAGE_GUARD protection to hide memory from other processes☆53Updated last year
- browse microsoft driver server for potentially vulnerable drivers☆29Updated last year
- ☆84Updated last year
- PoC kernel to usermode injection☆94Updated last year
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆87Updated 3 months ago
- using wnbios64.sys for arbitrary r/w☆15Updated 2 months ago
- DSE & PG bypass via BYOVD attack☆73Updated 5 months ago
- cr3 shuffle driver☆69Updated last year
- ☆44Updated 11 months ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆34Updated last year
- ☆37Updated last year
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆67Updated 3 months ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Updated 3 years ago
- manual map unsigned driver over signed memory☆210Updated last year
- A library to assist with memory & code protection.☆65Updated last year
- A simple tool to assemble shellcode ready to be copy-pasted into code☆71Updated 3 years ago
- ☆11Updated 3 years ago
- Compileable POC of namazso's x64 return address spoofer.☆50Updated 5 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆141Updated last year
- Kernel<->Usermode shared memory communcation using manually mapped driver☆22Updated 4 years ago
- Dumping processes using a kernel-mode driver.☆20Updated 4 years ago
- a header-only library to dynamically resolve modules and exports while also being able to call them directly☆22Updated 2 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆49Updated 3 months ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated 2 years ago
- A modern C++20 header-only library for advanced direct system call invocation.☆164Updated this week
- A method to Disable DSE using .data ptr hooks☆36Updated last year
- Use RTCore64 to map your driver on windows 11.☆140Updated 7 months ago