And it now landed!
A PoC implementation of Thread Stack Spoofing being an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocations from scanners and analysts.
Inspired by marvelous Nighthawk C2!
github.com/mgeeky/ThreadS
Conversation
And as for the line of code you've shared, not quite, coz' you'd only overwrite the very last address. To access previous ones you still need to walk the call stack.
1
1

