This tool will allow you to spoof the return addresses of your functions as well as system functions.
-
Updated
Nov 12, 2022 - C++
This tool will allow you to spoof the return addresses of your functions as well as system functions.
__sanitizer::SymbolizerTool ecosystem as a standalone library
A WIN/LINUX/OSX Crossplattform Debug Webserver
Walking the callstack in windows applications
Get text from C++ call stack and globals.
High performance anti-analysis header for Windows (Kernel & User) and Linux systems
Add a description, image, and links to the callstack topic page so that developers can more easily learn about it.
To associate your repository with the callstack topic, visit your repo's landing page and select "manage topics."