HoShiMin / formatPELinks
A bunch of parsers for PE and PDB formats in C++
☆252Updated last year
Alternatives and similar repositories for formatPE
Users that are interested in formatPE are comparing it to the libraries listed below
Sorting:
- Collection of undocumented Windows API declarations.☆319Updated last month
- C++ STL in the Windows Kernel with C++ Exception Support☆422Updated last year
- C/C++ Runtime library for system file (Windows Kernel Driver) - Supports Microsoft STL☆185Updated 2 years ago
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆403Updated last year
- COFF and Portable Executable format described using standard C++ with no dependencies.☆321Updated 3 months ago
- A modern c++ implementation of windows heavens gate☆228Updated 4 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆251Updated 6 months ago
- C++17 PE manualmapper☆367Updated 3 years ago
- Use ci.dll API for validating Authenticode signature of files☆154Updated 3 years ago
- Vectored Exception Handling Hooking Class☆163Updated 6 years ago
- Windows inline hooking tool.☆281Updated 6 years ago
- Elevate a process to be a protected process☆151Updated 5 years ago
- C++ Exceptions in Windows Drivers☆214Updated 4 years ago
- The Win32 Anti-Intrusion Library☆209Updated 6 years ago
- Windows Kernel Driver with C++ runtime☆172Updated 4 years ago
- x86 Binary Code Virtualization Tool☆219Updated 5 months ago
- System call hook for Windows 10 20H1☆496Updated 4 years ago
- Analyze patches in a process☆255Updated 4 years ago
- MemoryModule which compatible with Win32 API and support exception handling☆420Updated 5 months ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆307Updated 5 years ago
- A wrapper library around native windows sytem APIs☆435Updated 4 years ago
- The most powerful and customizable binary pattern scanner☆240Updated 3 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆332Updated 3 years ago
- ☆169Updated 7 years ago
- PE Viewer☆188Updated 6 months ago
- LLVM fork with explicit compatibility with MSVC 2022 features.☆322Updated 4 months ago
- Obfuscates all RTTI (Run-time type information) inside a binary☆197Updated 7 years ago
- Advanced x86/x86-64 hooking library (WIP).☆133Updated last year
- This project migrated to https://github.com/backengineering/llvm-msvc☆144Updated last year
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆136Updated 4 years ago