PoC Implementation of a fully dynamic call stack spoofer
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
翻译 - 线程堆栈欺骗 - PoC 用于高级内存中规避技术,允许更好地隐藏注入的 shellcode 的内存分配,以免扫描器和分析人员看到。
A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)
Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven
LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.
Use hardware breakpoints to spoof the call stack for both syscalls and API calls
NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs
A platform using the ELK stack to detect spoofed UDP DDoS amplification request traffic with netflow
ID-spoofing NFS client
Apple BLE proximity pairing message spoofing
Single Shot Face Anti-spoofing.
towards the solving spoofing problem
CNN archictecture for face anti-spoofing
Learning Generalized Spoof Cues for FaceAnti-spoofing
[ECCV2020] A Large-Scale Face Anti-Spoofing Dataset
Hack any Captive portal using MAC-spoofing technique
Stack trace visualizer
ChaLearn Face Anti-spoofing Attack Detection Challenge@CVPR2019
GetProcAddressByHash/remap/full dll unhooking/Tartaru's Gate/Spoofing Gate/universal/Perun's Fart/Spoofing-Gate/EGG/RecycledGate/syswhisper/RefleXXion golang implementation