Print compiler information stored in Rich Header of PE executables.
☆148Feb 25, 2026Updated last week
Alternatives and similar repositories for richprint
Users that are interested in richprint are comparing it to the libraries listed below
Sorting:
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- Win32 tool that allows to play with COM objects ( create objects of classes, call methods, set/get properties ). Can also create assembly…☆18May 19, 2022Updated 3 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- A general solution to simulate execution of virtualized instructions (vmprotect/themida, etc.).☆77Feb 9, 2022Updated 4 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆117May 26, 2020Updated 5 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆71Aug 14, 2021Updated 4 years ago
- This is a simple tool to remove the "Rich" header from binaries (EXE or DLL files) created by M$ development tools.☆33Feb 3, 2021Updated 5 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Oct 1, 2021Updated 4 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- Parser for the mysterious Rich header generated by MSVC☆14Apr 12, 2018Updated 7 years ago
- Hijack a dll in a process to do something.☆14Aug 21, 2020Updated 5 years ago
- Windows 32/64-bit Include files and Import Libraries☆16May 26, 2022Updated 3 years ago
- Parser for Microsoft Program Database (PDB) files☆78Jun 8, 2020Updated 5 years ago
- PDB Dumping Tool☆60Nov 7, 2022Updated 3 years ago
- x86_64, PE32+, FAT32 bootloader☆28Jul 4, 2021Updated 4 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- This is a simple driver with x64 inline assembly☆55Jun 26, 2020Updated 5 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Analyze patches in a process☆260Jul 28, 2021Updated 4 years ago
- Tool for PDB generation from IDA Pro database☆631Dec 10, 2025Updated 2 months ago
- Ring 0 debugger for HDPMI, Jemm and Win31/9X VMM☆15Mar 28, 2024Updated last year
- Windows Explorer application written in assembly☆15Jun 15, 2023Updated 2 years ago
- A driver to allow loading of EMM386.EXE in MS-DOS 8.00 real mode☆20Feb 11, 2026Updated 3 weeks ago
- PE permutation library☆278Apr 8, 2023Updated 2 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Nov 9, 2021Updated 4 years ago
- Run executables in an AppContainer☆125Jan 21, 2019Updated 7 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆80Jun 20, 2019Updated 6 years ago
- Cross-platform tool that allows browsing and extracting C and C++ type declarations from PDB files.☆361Feb 9, 2025Updated last year
- A class to gather information about a process, its threads and modules.☆23Mar 23, 2020Updated 5 years ago
- HadesMem is a C++-based memory hacking library for Windows based applications, with the goal of providing a safe, generic, powerful, and …☆28Jan 7, 2015Updated 11 years ago
- QLL : Level loaders☆13Feb 18, 2020Updated 6 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- mKEYB is a minimum keyboard driver for xxDOS, requiring only ~500 bytes of memory to support international keyboards☆16Jan 6, 2026Updated 2 months ago
- ☆13Aug 24, 2022Updated 3 years ago
- MS-DOS 7.1 FAT32 Bootsector for GPT-partitioned disks☆21Oct 29, 2022Updated 3 years ago
- An Integrity-Check Monitoring Pintool☆58Nov 2, 2020Updated 5 years ago
- penter hook example and driver time recorder☆31Oct 2, 2017Updated 8 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Feb 23, 2019Updated 7 years ago