0xRick / PE-ParserLinks
https://0xrick.github.io/win-internals/pe8/
☆48Updated 3 years ago
Alternatives and similar repositories for PE-Parser
Users that are interested in PE-Parser are comparing it to the libraries listed below
Sorting:
- Easy XOR string encryption for NET based binaries☆139Updated last year
- Add an empty section to a PE file☆53Updated 8 years ago
- Assembly block for hooking windows API functions.☆93Updated 6 years ago
- A cross-platform Python toolkit for parsing/writing PE files.☆67Updated last year
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆76Updated 2 years ago
- Compile shellcode into an exe file from Windows or Linux.☆68Updated 2 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated last year
- ☆71Updated 2 years ago
- Files for the packer tutorial☆73Updated 4 years ago
- C-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debug…☆116Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- ☆55Updated 3 years ago
- Batch script to compile a binary shellcode blob into an exe file☆87Updated 6 years ago
- Youtube channel sample code☆54Updated last week
- C++ library for low-level Windows development☆80Updated last year
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Windows API Hashes used in the malwares☆42Updated 10 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- Simple example for getting started with eBPF for Windows☆48Updated 5 months ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- My notes while studying Windows exploitation☆188Updated 2 years ago
- ☆63Updated last year
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 4 years ago
- ☆25Updated 2 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Updated 4 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- Samples from my book Windows Native API programming☆74Updated 3 months ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Updated 5 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago