iArtorias / pelib-updatedLinks
The updated PE file manipulation library from RetDec project.
☆20Updated last year
Alternatives and similar repositories for pelib-updated
Users that are interested in pelib-updated are comparing it to the libraries listed below
Sorting:
- X86/X64 Hardware Breakpoint Manager☆41Updated 4 years ago
- x64 assembler library☆31Updated last year
- Binary DisASseMbler☆23Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Open Anti Cheat☆27Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- .lib file for linking against the NT CRT☆19Updated 3 years ago
- ☆27Updated last year
- ☆48Updated 6 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆54Updated 2 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- A set of tools for working with software modifications in two files (Detours.h, Detours.cpp).☆42Updated this week
- Experimental imgui app framework for rapid prototyping.☆14Updated last year
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 4 years ago
- Translates WinDbg "dt" structure dump to a C structure☆13Updated 4 years ago
- A Simple Example☆22Updated 6 years ago
- A simple way to spoof return addresses using an exception handler☆32Updated 2 years ago
- Figuring out the cause of a handle downgrade☆24Updated 2 years ago
- direct systemcalls with a modern c++20 interface.☆43Updated 2 years ago
- Debug Print viewer (user and kernel)☆66Updated last year
- Some garbage drivers written for getting started☆65Updated 5 years ago
- An example code of CiGetCertPublisherName☆16Updated 3 years ago
- ☆32Updated 2 years ago
- NT reversal☆25Updated 7 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago
- Test data for x86 instructions☆13Updated 4 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆43Updated 3 years ago
- ☆35Updated 4 years ago
- Global DLL injector☆67Updated 4 years ago
- Analysing and defeating PatchGuard universally☆35Updated 4 years ago