TACIXAT / portable-executable-library
Automatically exported from code.google.com/p/portable-executable-library
☆23Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for portable-executable-library
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆72Updated 13 years ago
- Helper utility for debugging windows PE/PE+ loader.☆50Updated 9 years ago
- just an lite AntiRootkit for interesting☆23Updated 8 years ago
- Analyze PatchGuard☆53Updated 6 years ago
- Implementation of a dispatcher for Structured Exceptions inside a Vectored Exception Handler☆37Updated 4 years ago
- POC of sysenter x64 LSTAR MSR hook☆38Updated 10 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆40Updated 2 years ago
- Manual PE image mapper☆61Updated 11 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆33Updated 4 months ago
- Wow64 syscall hook☆40Updated 7 years ago
- Static library and headers for linking your software with ntdll.dll☆30Updated 4 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- Intermediate x86 instruction representation for use in obfuscation/deobfuscation.☆52Updated 7 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆22Updated 7 years ago
- idenLib (Library Function Identification) plugin for x32dbg☆41Updated 5 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆52Updated 7 months ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆93Updated 6 years ago
- This is a simple driver with x64 inline assembly☆52Updated 4 years ago
- PE Library x86☆20Updated 5 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- A command line tool to load and unload a device driver.☆44Updated 7 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆73Updated 5 years ago
- Library for kernel and user mode splicing for Windows (x86 and x64).☆62Updated 12 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆22Updated 9 years ago
- Shareds for kernel developement☆27Updated 10 years ago