danielkrupinski / x86RetSpoof

Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calling conventions. Written in C++17.

Date Created 2022-02-07 (2 years ago)
Commits 61 (last one about a year ago)
Stargazers 165 (0 this week)
Watchers 6 (0 this week)
Forks 31
License mit
Ranking

RepositoryStats indexes 523,840 repositories, of these danielkrupinski/x86RetSpoof is ranked #190,208 (64th percentile) for total stargazers, and #282,917 for total watchers. Github reports the primary language for this repository as C++, for repositories using this language it is ranked #10,626/28,144.

danielkrupinski/x86RetSpoof is also tagged with popular topics, for these it's ranked: reverse-engineering (#522/1071),  x86 (#138/257)

Other Information

danielkrupinski/x86RetSpoof has Github issues enabled, there is 1 open issue and 4 closed issues.

Star History

Github stargazers over time

Watcher History

Github watchers over time, collection started in '23

Recent Commit History

61 commits on the default branch (master) since jan '22

Yearly Commits

Commits to the default branch (master) per year

Issue History

Languages

The primary language is C++ but there's also others...

updated: 2024-05-15 @ 11:03am, id: 456634353 / R_kgDOGzev8Q