☆18Apr 4, 2019Updated 6 years ago
Alternatives and similar repositories for PE-Runtime-Data-Structures
Users that are interested in PE-Runtime-Data-Structures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- ☆23May 28, 2021Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 5 months ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57May 25, 2025Updated 9 months ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Feb 13, 2024Updated 2 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆76Nov 12, 2021Updated 4 years ago
- scripting IDA like a Pro☆24Oct 27, 2020Updated 5 years ago
- Comment rebasing for IDA Pro☆27Apr 6, 2020Updated 5 years ago
- The official repository of PowersheLLM, a model for Powershell maliciousness detection using fine-tuned LLM☆14Jun 6, 2024Updated last year
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Jun 24, 2021Updated 4 years ago
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated 2 months ago
- ☆23Mar 17, 2024Updated 2 years ago
- Microsoft Compound File Binary (CFB) file format Python IO☆15Mar 8, 2026Updated 2 weeks ago
- ☆16May 15, 2021Updated 4 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- PDF Parser is a command line tool and go library for analyzing PDF files.☆14Jan 25, 2024Updated 2 years ago
- ☆16May 22, 2014Updated 11 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆38Oct 21, 2020Updated 5 years ago
- Kernel Cache Decryption for iOS☆17Nov 16, 2021Updated 4 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- C Header Only Library for Virii☆11Nov 17, 2020Updated 5 years ago