adrianyy / pe64-parseLinks
Simple PE64 parser in Rust.
☆13Updated 6 years ago
Alternatives and similar repositories for pe64-parse
Users that are interested in pe64-parse are comparing it to the libraries listed below
Sorting:
- Wow64 syscall hook☆42Updated 8 years ago
- easy to use vtable hook with RTTI support☆23Updated 6 years ago
- Remote memory library in C++17.☆34Updated 7 years ago
- Analysing and defeating PatchGuard universally☆36Updated 5 years ago
- Some eternal WIP stuff :)☆20Updated 2 months ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆62Updated 5 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆26Updated 9 years ago
- x64 injector using LoadLibrary made in assembler (MASM)☆27Updated 7 years ago
- External cheat base with DirectX overlay☆20Updated 7 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆25Updated last year
- ☆14Updated 7 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Updated 6 years ago
- x64 assembler library☆31Updated last year
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- Analyze PatchGuard☆56Updated 7 years ago
- by others☆40Updated 8 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Updated 6 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Updated 8 years ago
- Modify process handle permissions☆61Updated 9 years ago
- (shard of furikuri project) assambler for code obfuscation☆19Updated 6 years ago
- A tool to dump informations about the caller of a function.☆13Updated 9 years ago
- Allows you to hook D3D dynamically - without having to research addresses or hook public API. Just grab the device!☆33Updated 11 years ago
- ☆50Updated 6 years ago
- Small tool which loads Windows drivers with NtLoadDriver☆47Updated 4 years ago
- ☆28Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27Updated 11 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Updated 3 years ago
- Use the Cheat Engine driver in your own process!☆25Updated 7 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Updated 7 years ago