HoShiMin / formatPELinks
A bunch of parsers for PE and PDB formats in C++
☆263Updated last year
Alternatives and similar repositories for formatPE
Users that are interested in formatPE are comparing it to the libraries listed below
Sorting:
- Collection of undocumented Windows API declarations.☆340Updated this week
- C++ STL in the Windows Kernel with C++ Exception Support☆434Updated 2 years ago
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆406Updated last year
- C/C++ Runtime library for system file (Windows Kernel Driver) - Supports Microsoft STL☆192Updated 3 years ago
- A modern c++ implementation of windows heavens gate☆242Updated 5 years ago
- COFF and Portable Executable format described using standard C++ with no dependencies.☆338Updated 8 months ago
- Vectored Exception Handling Hooking Class☆167Updated 7 years ago
- C++17 PE manualmapper☆419Updated 4 years ago
- Use ci.dll API for validating Authenticode signature of files☆164Updated 3 years ago
- The Win32 Anti-Intrusion Library☆212Updated 6 years ago
- Windows inline hooking tool.☆297Updated 7 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆272Updated 11 months ago
- Windows Kernel Driver with C++ runtime☆181Updated 5 years ago
- Elevate a process to be a protected process☆155Updated 6 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆337Updated 5 years ago
- A wrapper library around native windows sytem APIs☆445Updated 4 years ago
- System call hook for Windows 10 20H1☆496Updated 4 years ago
- C++ Exceptions in Windows Drivers☆221Updated 5 years ago
- MemoryModule which compatible with Win32 API and support exception handling☆443Updated 11 months ago
- x86 Binary Code Virtualization Tool☆224Updated 11 months ago
- Obfuscates all RTTI (Run-time type information) inside a binary☆202Updated 8 years ago
- ☆172Updated 8 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆382Updated 3 years ago
- LLVM fork with explicit compatibility with MSVC 2022 features.☆368Updated this week
- The most powerful and customizable binary pattern scanner☆246Updated 4 years ago
- Advanced x86/x86-64 hooking library (WIP).☆137Updated 2 years ago
- Analyze patches in a process☆258Updated 4 years ago
- Hide function calls to prevent reverse-engineering☆74Updated 4 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆277Updated 3 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆145Updated 2 years ago