Silva97 / peiLinks
PE Injector - Inject code on 32-bit and 64-bit PE executables
☆33Updated 3 years ago
Alternatives and similar repositories for pei
Users that are interested in pei are comparing it to the libraries listed below
Sorting:
- A simple multiplatform command line search tool for Windows API.☆46Updated 3 months ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 3 years ago
- Multiplatform CLI and GUI tool to show information about ELF files☆57Updated last year
- Capture newly created files on Windows☆66Updated 3 years ago
- CLI program to calculate the entropy of files☆70Updated last year
- Open malware analysis / reversing database☆11Updated 3 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆41Updated 5 months ago
- a cpp wrapper for ngrok☆9Updated 4 years ago
- A simple x64 debugger for Linux☆9Updated 6 years ago
- Repositório do Curso de Ghidra☆19Updated 4 years ago
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆14Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 4 years ago
- x86 OS development using Bochs emulator. MIT xv6, JamesM's kernel development tutorials (with some changes) & more☆82Updated last year
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x☆128Updated last year
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆92Updated 4 years ago
- An ELF / PE binary packer written in pure C, made for fun☆91Updated last year
- Exploit development challenges!☆24Updated 2 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆37Updated 3 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- ☆10Updated 6 years ago
- Set of antianalysis techniques found in malware☆132Updated last year
- ☆106Updated 6 years ago
- PoC designed to evade userland-hooking anti-virus.☆88Updated 6 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆75Updated 2 years ago
- Resources from Trend Micro Research teams☆23Updated 6 months ago
- The PE library used by @merces/pev☆119Updated 2 years ago
- reconstruct z0mbie's homepage from 2005☆40Updated 3 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆84Updated 4 years ago