PELock / Portable-Executable-PE-Format-Poster
A Portable Executable (PE) Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with comments from WinNT.h header file).
☆19Updated 2 years ago
Alternatives and similar repositories for Portable-Executable-PE-Format-Poster:
Users that are interested in Portable-Executable-PE-Format-Poster are comparing it to the libraries listed below
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- x64dbg scripts for finding OEP of packers☆14Updated 6 years ago
- This x64dbg plugin adds several commands for dumping PE header information by address.☆61Updated 7 years ago
- BITS Transfers Manager☆40Updated last week
- DLL and API hooking example to hide running in a Terminal Session☆18Updated 4 years ago
- A class to gather information about a process, its threads and modules.☆24Updated 5 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆20Updated 5 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- The program is intended for a dynamic unpacking of binders, crypters, packers and protectors☆11Updated 4 years ago
- ☆22Updated 4 years ago
- A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes☆17Updated 5 years ago
- Plugin to label PEB addresses.☆29Updated 8 years ago
- Simple code generation library developed in C intended for code generation in Kernel mode☆16Updated 2 years ago
- IDAPython scripts☆15Updated 7 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- ☆18Updated 5 years ago
- A CMake template for projects using MS Detours☆21Updated last month
- Load and unload a DLL into an remote process without using WriteProcessMemory ;)☆16Updated 10 years ago
- ☆45Updated 4 months ago
- PDB Dumping Tool☆56Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Simple PE Packer Which Encrypts .text Section☆51Updated 7 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆16Updated 7 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆41Updated 3 years ago
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆12Updated 4 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Updated 5 years ago
- A simple and universal .NET proxy remover☆10Updated 4 years ago
- JITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.☆52Updated 4 years ago
- Local Api Hooker coded in MASM☆9Updated 6 years ago