paskalian / RetSpooferLinks
Spoof the return address of any function call.
☆11Updated last year
Alternatives and similar repositories for RetSpoofer
Users that are interested in RetSpoofer are comparing it to the libraries listed below
Sorting:
- Translate virtual addresses to physical addresses from usermode.☆101Updated last year
- ntoskrnl .data hooks for UM-KM communication☆53Updated last year
- Experiment with PAGE_GUARD protection to hide memory from other processes☆54Updated last year
- Kernel Level NMI Callback Blocker☆157Updated 4 months ago
- browse microsoft driver server for potentially vulnerable drivers☆30Updated last year
- PoC kernel to usermode injection☆103Updated last year
- using wnbios64.sys for arbitrary r/w☆15Updated 3 months ago
- Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty☆85Updated last week
- ☆46Updated last year
- ☆83Updated last year
- DSE & PG bypass via BYOVD attack☆77Updated 6 months ago
- Compileable POC of namazso's x64 return address spoofer.☆50Updated 5 years ago
- a header-only library to dynamically resolve modules and exports while also being able to call them directly☆22Updated 2 years ago
- manual map unsigned driver over signed memory☆215Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Updated 3 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆133Updated 2 years ago
- Decrypting and intercepting encrypted imports of Vanguards Kernel Driver☆34Updated last year
- load unsigned kernel-driver by patching dse in 248 lines☆140Updated last year
- A method to Disable DSE using .data ptr hooks