hasherezade / pe-bear-releasesLinks
PE-bear (builds only)
☆780Updated 2 years ago
Alternatives and similar repositories for pe-bear-releases
Users that are interested in pe-bear-releases are comparing it to the libraries listed below
Sorting:
- Dynamic unpacker based on PE-sieve☆787Updated 3 months ago
- A Pin Tool for tracing API calls etc☆1,592Updated last month
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆1,030Updated 2 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,311Updated last month
- Linker/Compiler/Tool detector for Windows, Linux and MacOS.☆571Updated this week
- Portable Executable parsing library (from PE-bear)☆658Updated 2 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,282Updated last month
- PE file viewer/editor for Windows, Linux and MacOS.☆1,171Updated this week
- Quickly debug shellcode extracted during malware analysis☆621Updated 2 years ago
- XNTSV program for detailed viewing of system structures for Windows.☆468Updated this week
- Windows kernel and user mode emulation.☆1,805Updated 3 weeks ago
- Converts a DLL into EXE☆818Updated 2 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆822Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,176Updated 2 years ago
- All reasonably stable tools☆1,358Updated 5 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,509Updated last month
- ☆823Updated 5 years ago
- Process Monitor X v2☆639Updated last year
- Protected Processes Light Killer☆970Updated 2 years ago
- Converts a EXE into DLL☆1,352Updated 3 months ago
- Native API header files for the System Informer project.☆1,308Updated 7 months ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆792Updated last year
- Obfuscate specific windows apis with different apis☆1,018Updated 4 years ago
- PE Tools - Portable executable (PE) manipulation toolkit☆1,154Updated 2 months ago
- Automatic and platform-independent unpacker for Windows binaries based on emulation☆725Updated 4 months ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆845Updated last year
- Enumerate and disable common sources of telemetry used by AV/EDR.☆813Updated 4 years ago
- Windows Object Explorer 64-bit☆1,851Updated 3 weeks ago
- AV/EDR evasion via direct system calls.☆1,965Updated 2 years ago
- View ETW Provider manifest☆557Updated last year