0xRick / PE-ParserLinks
https://0xrick.github.io/win-internals/pe8/
☆50Updated 4 years ago
Alternatives and similar repositories for PE-Parser
Users that are interested in PE-Parser are comparing it to the libraries listed below
Sorting:
- A cross-platform Python toolkit for parsing/writing PE files.☆66Updated last year
- Add an empty section to a PE file☆53Updated 8 years ago
- Collection of DLL function export forwards for DLL export function proxying☆106Updated 3 months ago
- Simple example for getting started with eBPF for Windows☆48Updated 9 months ago
- Assembly block for hooking windows API functions.☆93Updated 6 years ago
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago
- C-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debug…☆115Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- Batch script to compile a binary shellcode blob into an exe file☆87Updated 6 years ago
- ☆72Updated 2 years ago
- Samples from my book Windows Native API programming☆79Updated 6 months ago
- C++ library for low-level Windows development☆80Updated last year
- ☆76Updated 8 years ago
- Files for the packer tutorial☆74Updated 4 years ago
- Easy XOR string encryption for NET based binaries☆140Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Windows Kernel Programming Experiments☆82Updated 3 years ago
- ☆63Updated last year
- Simple windows API logger☆109Updated 6 years ago
- Youtube channel sample code☆52Updated 2 weeks ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- A WinDbg extension to trace COM interactions☆122Updated 3 months ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Updated 5 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆78Updated 2 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆73Updated last year
- A C++ Yara Rule Runner☆12Updated 3 years ago
- Windows API Hashes used in the malwares☆42Updated 10 years ago