avast / pe_toolsLinks
A cross-platform Python toolkit for parsing/writing PE files.
☆66Updated last year
Alternatives and similar repositories for pe_tools
Users that are interested in pe_tools are comparing it to the libraries listed below
Sorting:
- A ready-made template for a project based on libpeconv.☆50Updated 3 weeks ago
- A set of small utilities, helpers for PIN tracers☆34Updated last month
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 4 years ago
- ☆26Updated 3 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 2 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆62Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆27Updated 2 years ago
- Yet another Windows DLL injector.☆39Updated 4 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆36Updated 5 years ago
- Authenticode-parser is a simple C library for Authenticode format parsing using OpenSSL.☆20Updated last year
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 5 months ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆61Updated 5 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆86Updated 5 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated 2 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- Simple windows API logger☆109Updated 6 years ago
- ☆72Updated 2 years ago
- ☆25Updated 2 years ago
- Clone running process with ZwCreateProcess☆58Updated 5 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Windows kernel PDB data parsed into YAML☆41Updated 3 weeks ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago
- Library and tools to access the Windows Minidump (MDMP) format☆44Updated last year
- ☆18Updated 4 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆78Updated 2 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆32Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆74Updated 2 years ago