HACKE-RC / perituxLinks
A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.
☆18Updated 2 years ago
Alternatives and similar repositories for peritux
Users that are interested in peritux are comparing it to the libraries listed below
Sorting:
- ☆26Updated 10 months ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆11Updated 2 years ago
- ☆29Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- ☆32Updated 6 months ago
- Abusing exceptions for code execution.☆112Updated 2 years ago
- A journal for $6,000 Riot Vanguard bounty.☆65Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆34Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- Signature finder (from PE-bear)☆39Updated 3 weeks ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 5 months ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 7 months ago
- A post-processing script for TinyTracer☆37Updated 2 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆36Updated last year
- A minimalistic logger for Windows Kernel Drivers.☆24Updated last year
- Generate a PDB file given the old PDB file and an address mapping☆49Updated last month
- Progress of learning kernel development☆14Updated 2 years ago
- Intel 64/Windows low-level experiments☆60Updated 3 weeks ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- ☆71Updated 2 years ago
- ☆25Updated last year
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆112Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆34Updated 9 months ago