PELock / Portable-Executable-PE-Format-Poster
A Portable Executable (PE) Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with comments from WinNT.h header file).
☆19Updated last year
Alternatives and similar repositories for Portable-Executable-PE-Format-Poster:
Users that are interested in Portable-Executable-PE-Format-Poster are comparing it to the libraries listed below
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆12Updated 4 years ago
- A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes☆17Updated 4 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆20Updated 5 years ago
- Code Injection technique written in cpp language☆30Updated 7 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- x64dbg scripts for finding OEP of packers☆14Updated 6 years ago
- ☆22Updated 4 years ago
- ☆18Updated 5 years ago
- Send SECURE_ERASE_UNIT and SANITIZE_DEVICE ATA command to hard disks☆47Updated 10 years ago
- Small Plugin to make x64dbg Window becomes transparent☆13Updated 7 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- A class to gather information about a process, its threads and modules.☆24Updated 4 years ago
- Small class to help perform syscalls.☆21Updated last year
- This x64dbg plugin adds several commands for dumping PE header information by address.☆61Updated 7 years ago
- Deobfuscator for remove proxy calls methods☆24Updated 2 years ago
- Proof of concept headless GUI DLL☆12Updated 3 years ago
- Class implementation of PowerLoader injection technique☆29Updated 8 years ago
- Load and unload a DLL into an remote process without using WriteProcessMemory ;)☆16Updated 10 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- DLL and API hooking example to hide running in a Terminal Session☆17Updated 4 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆45Updated 2 years ago
- working injector bp (BE EAC & VANGUARD)☆4Updated 3 years ago
- The program is intended for a dynamic unpacking of binders, crypters, packers and protectors☆10Updated 4 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Updated 13 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- Redirects a specified API for a one time execution of code upon injection into a process.☆15Updated 4 years ago
- ☆44Updated 2 months ago