PoC Implementation of a fully dynamic call stack spoofer
-
Updated
Jul 20, 2024 - C++
PoC Implementation of a fully dynamic call stack spoofer
Use hardware breakpoints to spoof the call stack for both syscalls and API calls
Stack spoofing Detection for CET processes by comparing shadow and user stacks.
一个基于go写的shellcode_load. Advanced modular evasion loader for Windows x64. Features Build Tag-based isolation, Indirect Syscalls, Telemetry Blinding (ETW/AMSI), and robust Call Stack Spoofing to thwart EDR stack analysis.
Add a description, image, and links to the stack-spoofing topic page so that developers can more easily learn about it.
To associate your repository with the stack-spoofing topic, visit your repo's landing page and select "manage topics."