Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of functions
☆45Apr 1, 2023Updated 2 years ago
Alternatives and similar repositories for Symbol-Parser
Users that are interested in Symbol-Parser are comparing it to the libraries listed below
Sorting:
- A class to gather information about a process, its threads and modules.☆23Mar 23, 2020Updated 5 years ago
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆159Mar 26, 2024Updated last year
- Inject dll to process in driver☆10Aug 27, 2024Updated last year
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆118May 29, 2025Updated 9 months ago
- Software Distribution Service☆12Jul 2, 2015Updated 10 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71May 11, 2022Updated 3 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- Hijack a dll in a process to do something.☆14Aug 21, 2020Updated 5 years ago
- Example WDF/KMDF driver and test app demonstrating the "inverted call model"☆37May 1, 2020Updated 5 years ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- ☆48Feb 3, 2025Updated last year
- ☆14Apr 7, 2018Updated 7 years ago
- A library with four different methods to execute shellcode in a process☆26Mar 24, 2020Updated 5 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago
- 扫描以及恢复 r3hook 类☆10Aug 29, 2021Updated 4 years ago
- eac memory sig maker☆14Jun 10, 2021Updated 4 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆80Jun 20, 2019Updated 6 years ago
- Windows 32/64-bit Include files and Import Libraries☆16May 26, 2022Updated 3 years ago
- ☆27Jan 4, 2024Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- ☆53Dec 21, 2022Updated 3 years ago
- ☆13Sep 21, 2025Updated 6 months ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- force delete runing .exe application file.or delete any locked file☆74Mar 21, 2023Updated 3 years ago
- A modern C++ port of the HDE (Hacker Disassembler Engine).☆19Mar 4, 2026Updated 2 weeks ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- A Memory Read And Write the Hide Driver☆72Dec 2, 2020Updated 5 years ago
- Windows kernel drivers simple HTTP library for modern C++☆40Jul 12, 2018Updated 7 years ago
- a monitoring windows driver calls kernel api tools☆129Jul 5, 2024Updated last year
- Process Creation, Image Load and Thread Creation Notification☆13Sep 15, 2023Updated 2 years ago
- Dumps all resources from a PE file (EXE, DLL, ...)☆11Jan 13, 2019Updated 7 years ago
- Analysing and defeating PatchGuard universally☆35Nov 4, 2020Updated 5 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Apr 17, 2021Updated 4 years ago
- first commit☆64Oct 29, 2020Updated 5 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- c++ implementation of windows heavens gate☆71Feb 12, 2021Updated 5 years ago
- manual mapping injector☆29Sep 28, 2025Updated 5 months ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago