iArtorias / pelib-updated
The updated PE file manipulation library from RetDec project.
☆20Updated last year
Alternatives and similar repositories for pelib-updated:
Users that are interested in pelib-updated are comparing it to the libraries listed below
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- x64 assembler library☆31Updated 9 months ago
- Binary DisASseMbler☆23Updated 2 years ago
- X86/X64 Hardware Breakpoint Manager☆41Updated 3 years ago
- Open Anti Cheat☆27Updated 2 years ago
- ☆27Updated last year
- A small header file mapping status codes passed to KiExceptionDispatch before KiPreprocessFault to individual CPU faults.☆13Updated 5 years ago
- .lib file for linking against the NT CRT☆18Updated 3 years ago
- Translates WinDbg "dt" structure dump to a C structure☆13Updated 4 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆43Updated last year
- An example code of CiGetCertPublisherName☆14Updated 2 years ago
- Elevate arbitrary MSR writes to kernel execution.☆32Updated last year
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 6 months ago
- reveal and detect of common hooks under win32☆13Updated 4 years ago
- Experimental imgui app framework for rapid prototyping.☆14Updated last year
- A way to detect DBI frameworks, Debuggers and VMs.☆22Updated 4 years ago
- ☆34Updated 4 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- ☆30Updated last year
- Black Signature Driver☆22Updated last year
- A poc that abuses Enclave☆37Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆32Updated 3 years ago
- A slightly safer io access library☆13Updated 3 years ago
- windows kernel pagehook☆38Updated 2 years ago
- ☆48Updated 6 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆52Updated 2 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆26Updated 5 years ago
- paste string formatted byte data block into x64dbg easy.☆39Updated 4 years ago
- ☆15Updated 2 years ago