hasherezade / pe_unmapper
Small tool to convert beteween the PE alignments (raw and virtual).
☆87Updated 2 years ago
Alternatives and similar repositories for pe_unmapper
Users that are interested in pe_unmapper are comparing it to the libraries listed below
Sorting:
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆136Updated 8 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 10 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆151Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆114Updated 2 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆109Updated 3 years ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆117Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆120Updated 2 years ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆77Updated last year
- Native Python3 bindings for @horsicq's Detect-It-Easy☆68Updated 2 months ago
- Writeups for CTF challenges☆31Updated last year
- Simple windows API logger☆102Updated 5 years ago
- Single header version of System Informer's phnt library.☆217Updated last week
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆71Updated last year
- UnpacMe IDA Byte Search☆28Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆245Updated 2 years ago
- MalUnpack companion driver☆98Updated 10 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆123Updated last year
- ☆31Updated 3 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- Various Process Injection Techniques☆148Updated 2 years ago
- Helpful WinDBG command for kernel debugging☆22Updated 4 years ago
- IDA plugin for quickly copying disassembly as encoded hex bytes☆62Updated 3 years ago
- Reverse engineering winapi function loadlibrary.☆191Updated 2 years ago
- Hooking Windows' exception dispatcher to protect process's PML4☆169Updated 3 months ago
- Parse .NET executable files.☆76Updated 3 months ago
- ☆89Updated 11 months ago
- An x86-64 code virtualizer for VM based obfuscation☆120Updated 4 months ago
- Easy-to-use IDA plugin for code emulation☆31Updated last year
- spoof return address☆74Updated 2 years ago