A ready-made template for a project based on libpeconv.
☆52Oct 31, 2025Updated 4 months ago
Alternatives and similar repositories for libpeconv_tpl
Users that are interested in libpeconv_tpl are comparing it to the libraries listed below
Sorting:
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 4 months ago
- A small library helping to parse commandline parameters (for C/C++)☆57May 25, 2025Updated 9 months ago
- A set of small utilities, helpers for PIN tracers☆37Feb 15, 2026Updated 2 weeks ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Jun 24, 2021Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Aug 6, 2025Updated 6 months ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Oct 26, 2020Updated 5 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,331Oct 31, 2025Updated 4 months ago
- WIP python3 plugin for x64dbg☆16Mar 31, 2021Updated 4 years ago
- ☆76Nov 30, 2023Updated 2 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆187Apr 22, 2025Updated 10 months ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- VCL-based UI components for system tools that use NtUtilsLibrary☆21Nov 20, 2025Updated 3 months ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆36Jan 12, 2022Updated 4 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- Kernel (Ring0) - SSDT unhook driver☆14Feb 22, 2018Updated 8 years ago
- ☆18Mar 1, 2021Updated 5 years ago
- Experiment on reproducing Obfuscate & Sleep☆162Mar 14, 2021Updated 4 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- ☆49Nov 7, 2024Updated last year
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆37May 19, 2021Updated 4 years ago
- Import an x64dbg database into a Ghidra Project☆22Aug 22, 2019Updated 6 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆638Aug 30, 2022Updated 3 years ago
- ☆73Sep 4, 2023Updated 2 years ago
- Players' Unknown Battleground Vulnerabilities Test PoC☆18Apr 15, 2019Updated 6 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- Persistent IAT hooking application - based on bearparser☆264Sep 18, 2022Updated 3 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆89Nov 9, 2015Updated 10 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Oct 29, 2019Updated 6 years ago