hasherezade / pe_utilsLinks
A set of small utilities, helpers for PIN tracers
☆34Updated last month
Alternatives and similar repositories for pe_utils
Users that are interested in pe_utils are comparing it to the libraries listed below
Sorting:
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆62Updated last year
- A ready-made template for a project based on libpeconv.☆50Updated last month
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 6 months ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 3 months ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆36Updated 4 years ago
- Clone running process with ZwCreateProcess☆59Updated 5 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆74Updated 2 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆36Updated 5 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆27Updated 2 years ago
- Small visualizator for PE files☆70Updated 2 years ago
- ☆23Updated 4 years ago
- Miscellaneous Code and Docs☆84Updated 4 months ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated 2 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 7 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆33Updated 2 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Updated 5 years ago
- PoC for hiding PE exports☆67Updated 4 years ago
- ☆49Updated 5 years ago
- Sysmon shenanigans☆66Updated 5 years ago
- ☆18Updated 4 years ago
- Windows kernel PDB data parsed into YAML☆41Updated 3 weeks ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- allowing um r/w through km from um ioctl ™☆11Updated 3 years ago
- ☆26Updated 3 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 2 years ago
- Code Integrity Violation Spotter☆17Updated last year
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- ☆30Updated 2 months ago