gbmaster / loadLibrary
Custom LoadLibrary implementation
☆57Updated 9 years ago
Alternatives and similar repositories for loadLibrary:
Users that are interested in loadLibrary are comparing it to the libraries listed below
- Recreation of GetProcAddress without external dependencies on Windows Libraries☆89Updated 9 years ago
- WinDbg debugger extension library providing various tools to analyse, dump and fix (restore) Microsoft Portable Executable files for both…☆82Updated 6 months ago
- usermode standalone kernel interface☆111Updated 6 years ago
- Implementation of a dispatcher for Structured Exceptions inside a Vectored Exception Handler☆40Updated 5 years ago
- Cross-platform library for parsing and building PE\PE+ formats☆77Updated 2 years ago
- ☆29Updated 6 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆76Updated 5 years ago
- disable most common windowsx64 systems patchguard☆84Updated 6 years ago
- Library for kernel and user mode splicing for Windows (x86 and x64).☆63Updated 12 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆77Updated 2 years ago
- C++ 17 compile time string encryption supporting vs2010-2019☆73Updated 4 years ago
- Translates WinDbg "dt" structure dump to a C structure☆128Updated 8 years ago
- This x64dbg plugin adds several commands for dumping PE header information by address.☆61Updated 7 years ago
- Advanced x86/x86-64 hooking library (WIP).☆127Updated last year
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆134Updated 5 years ago
- PE Bliss - Cross-Platform Portable Executable C++ Library☆58Updated last year
- A small tool to produce a dummy pdb for an executable with symbols at addresses from a file☆40Updated 7 years ago
- Small utility DLL that loads and reloads a given DLL when it's updated on disk.☆40Updated last year
- Kernel Detective☆141Updated 2 years ago
- x64 syscall caller in C++.☆87Updated 6 years ago
- Improves Hex-Rays output through batch decompilation.☆67Updated 6 years ago
- Import library generator for x86 PE files☆56Updated 5 years ago
- C++ Code+Data Obfuscation Library with Build-Time Polymorphism☆107Updated 7 years ago
- x86-64 virtual machine and disassembler☆129Updated 5 years ago
- Manual PE image mapper☆64Updated 11 years ago
- Hide function calls to prevent reverse-engineering☆68Updated 3 years ago
- Pointer Sequence Reverser - enable you to see how Windows C++ application is accessing a particular data member or object.☆70Updated 7 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆86Updated 9 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆66Updated 5 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago