| Crates.io | jopcall |
| lib.rs | jopcall |
| version | 0.1.0 |
| created_at | 2025-07-28 06:24:51.462554+00 |
| updated_at | 2025-07-28 06:24:51.462554+00 |
| description | Dynamically executed Windows Syscalls via JOP/ROP |
| homepage | |
| repository | https://github.com/NoahKirchner/jopcall |
| max_upload_size | |
| id | 1770755 |
| size | 36,988 |
This project is dedicated to the 14 Yuenglings that proudly served and lost their lives to produce this project.
This is an extremely unsafe project built to allow users to make Windows syscalls through a simple API while obfuscating the return address with a user defined ROP chain discovered at runtime. Outside of the procedural macro for API hashing it has no dependencies, makes no heap allocations, and can be compiled directly to position independent shellcode.