PELock / Portable-Executable-PE-Format-PosterLinks
A Portable Executable (PE) Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with comments from WinNT.h header file).
☆20Updated 2 years ago
Alternatives and similar repositories for Portable-Executable-PE-Format-Poster
Users that are interested in Portable-Executable-PE-Format-Poster are comparing it to the libraries listed below
Sorting:
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- A tool for Windows that can make any program work within file-system transactions.☆59Updated 4 years ago
- StringEncrypt allows you to encrypt strings and files using a randomly generated algorithm, generating a unique decryption code (so-calle…☆22Updated 2 years ago
- This x64dbg plugin adds several commands for dumping PE header information by address.☆63Updated 8 years ago
- AutoIt Obfuscator lets you protect AutoIt script source code against analysis, reverse engineering & decompilation using advanced obfusca…☆49Updated last year
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆12Updated 5 years ago
- ☆23Updated 4 years ago
- 64-bit version of IDR (not complete, use as is)☆46Updated 6 years ago
- A simple class in C++ to load and read/write process memory, it comes with an example of how to decrypt the once popular demoscene e-zine…☆18Updated 10 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Updated 9 years ago
- A CMake template for projects using MS Detours☆23Updated 7 months ago
- My collection of unpackers for malware packers/crypters☆28Updated 8 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- BITS Transfers Manager☆44Updated 4 months ago
- A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes☆16Updated 5 years ago
- Capture newly created files on Windows☆65Updated 3 years ago
- DLL and API hooking example to hide running in a Terminal Session☆20Updated 5 years ago
- CopyToAsm (x64) - A Plugin For x64dbg☆31Updated 7 years ago
- Load and unload a DLL into an remote process without using WriteProcessMemory ;)☆16Updated 11 years ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Updated 5 years ago
- A driver to intercept low level windows events☆63Updated 5 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Updated 6 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆37Updated 2 years ago
- Collection of Tutorials from Tuts4You☆69Updated 4 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆20Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 5 years ago
- This program allows to edit the relocation table into a Portable Executable file☆52Updated 5 years ago
- ☆42Updated 8 years ago
- Archive of ransomware decryptors☆31Updated 7 years ago