PoC Implementation of a fully dynamic call stack spoofer
-
Updated
Jul 20, 2024 - C++
PoC Implementation of a fully dynamic call stack spoofer
Use hardware breakpoints to spoof the call stack for both syscalls and API calls
一个基于go写的shellcode_load. Advanced modular evasion loader for Windows x64. Features Build Tag-based isolation, Indirect Syscalls, Telemetry Blinding (ETW/AMSI), and robust Call Stack Spoofing to thwart EDR stack analysis.
Add a description, image, and links to the stack-spoofing topic page so that developers can more easily learn about it.
To associate your repository with the stack-spoofing topic, visit your repo's landing page and select "manage topics."