adamhlt / PE-Explorer
PE Explorer in C++ (x86 / x64) - PE file parser, retrieve exports and imports
☆66Updated last year
Alternatives and similar repositories for PE-Explorer:
Users that are interested in PE-Explorer are comparing it to the libraries listed below
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆77Updated last week
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆125Updated 3 years ago
- Debug Print viewer (user and kernel)☆65Updated last year
- An improved Detours.☆53Updated last month
- Anti-debug library based on al-khaser with ScyllaHide/TitanHide detection.☆57Updated 5 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆82Updated last year
- a lightweight library geared towards windows process hacking/manipulation, but with much more use case.☆31Updated 3 years ago
- View Windows System in action☆40Updated last week
- Another wow64ext to try to be compatible with WOW64 for all architectures.☆94Updated 2 months ago
- Simple NtQuerySystemInformation hook for your hacking apps.☆40Updated 3 years ago
- Hide function calls to prevent reverse-engineering☆68Updated 3 years ago
- PE Viewer☆171Updated 2 months ago
- force delete runing .exe application file.or delete any locked file☆70Updated 2 years ago
- Class containing Anti-RE, Anti-Debug and Anti-Hook methods. Made for C++/CLI☆105Updated 2 years ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Updated 5 years ago
- https://www.codeproject.com/Articles/5348168/Disable-Driver-Signature-Enforcement-with-DSE-Patc☆16Updated last year
- Updated VMP Demutator from sn0w☆33Updated 3 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆55Updated 2 years ago
- Detects virtual machines and malware analysis environments☆120Updated 2 years ago
- IAT Hooking POC (x86 / x64) - Hook functions through the IAT☆32Updated 8 months ago
- A simple DLL to bypass the anti debugging methods from GH Anti Debugging with explanation☆53Updated 4 years ago
- Elevate a process to be a protected process☆144Updated 5 years ago
- ☆45Updated 4 years ago
- Memory integrity check with CRC32 instruction, section-based☆43Updated 2 years ago
- Monitor Kernel pool allocations tags☆61Updated last year
- A multiline (and ultimate) assembler (and disassembler) plugin for x64dbg and OllyDbg. A perfect tool for modifying and extending a compi…☆134Updated 2 months ago
- Noninvasive debugging plugin for X64Dbg☆102Updated 4 months ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆69Updated 5 years ago
- Custom LoadLibrary / GetProcAddress (x86 / x64) - Load DLL and retrieve functions manually☆87Updated last year
- Dump .net assembly from a native loader which uses ClrCreateinstance☆54Updated 2 years ago