dz333n / pelauncherView external linksLinks
Portable Executable launcher for Windows NT bypassing loader
☆74Sep 4, 2025Updated 5 months ago
Alternatives and similar repositories for pelauncher
Users that are interested in pelauncher are comparing it to the libraries listed below
Sorting:
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Oct 22, 2019Updated 6 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes☆15Mar 23, 2020Updated 5 years ago
- Library for using direct system calls☆36Jan 30, 2025Updated last year
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- x64dbg scripts for finding OEP of packers☆15Oct 22, 2018Updated 7 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- ☆17Feb 29, 2020Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Oct 16, 2019Updated 6 years ago
- A simple DLL that can intercept HID messages and pass them on to the real HID DLL, while logging the data.☆22Oct 3, 2014Updated 11 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Simple PE64 parser in Rust.☆13Jul 4, 2019Updated 6 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆15Nov 6, 2017Updated 8 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆14Mar 31, 2016Updated 9 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- An open source library for operating the Windows Overlay Filter driver.☆22Jan 16, 2019Updated 7 years ago
- Cross-platform library for parsing and building PE\PE+ formats☆80Jul 31, 2022Updated 3 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- Some interesting code☆18Jan 16, 2015Updated 11 years ago
- Qiling Framework Documentation☆18Mar 9, 2025Updated 11 months ago
- Windows 32/64-bit Include files and Import Libraries☆16May 26, 2022Updated 3 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- (shard of furikuri project) assambler for code obfuscation☆19Oct 29, 2019Updated 6 years ago
- Simple RAT (only on own network) made in C++☆19Mar 11, 2013Updated 12 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- A hacky tool to patch PE binaries.☆25Jan 1, 2018Updated 8 years ago
- Library for linking multiple PE\PE + files to one☆52Mar 16, 2024Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Jun 4, 2019Updated 6 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- A test project to try the new win32k.sys system call filtering mitigation in Windows 10☆15Mar 17, 2019Updated 6 years ago