__sanitizer::SymbolizerTool ecosystem as a standalone library
-
Updated
May 27, 2023 - C++
__sanitizer::SymbolizerTool ecosystem as a standalone library
This tool will allow you to spoof the return addresses of your functions as well as system functions.
Walking the callstack in windows applications
Get text from C++ call stack and globals.
A WIN/LINUX/OSX Crossplattform Debug Webserver
Add a description, image, and links to the callstack topic page so that developers can more easily learn about it.
To associate your repository with the callstack topic, visit your repo's landing page and select "manage topics."