simple PE parser
☆12Mar 14, 2017Updated 9 years ago
Alternatives and similar repositories for pe
Users that are interested in pe are comparing it to the libraries listed below
Sorting:
- KVM-based memory access recorder☆20Oct 14, 2018Updated 7 years ago
- Unofficial website of security camp☆14Aug 19, 2025Updated 7 months ago
- 部活用備品管理システム☆14Sep 30, 2018Updated 7 years ago
- Raccoon Signature Scheme -- Reference Code☆13Jul 12, 2023Updated 2 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- colorscheme☆20Dec 5, 2021Updated 4 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Sync the time on your PineTime using Chrome over Bluetooth LE☆12Mar 31, 2022Updated 3 years ago
- Raw BLE advertisement + sniffing tool (Linux)☆16Feb 5, 2024Updated 2 years ago
- A policy document about open source software referenced at Cybozu.☆24Jul 8, 2020Updated 5 years ago
- ☆14Updated this week
- ☆14Jun 30, 2015Updated 10 years ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- Header only C++ implementation of the Wasserstein distance (or earth mover's distance)☆15Nov 13, 2020Updated 5 years ago
- Linux Remote Process Injection and Hooking Example - htop☆12Apr 30, 2021Updated 4 years ago
- Masked Hardware AES with HPC☆17Oct 29, 2025Updated 4 months ago
- Go bindings for yara: pattern matching swiss knife http://plusvic.github.io/yara/☆10Jul 21, 2015Updated 10 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- 캐글 컴피티션 코드 정리 팁☆10Oct 10, 2019Updated 6 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- Adelie's source code☆12Mar 2, 2022Updated 4 years ago
- ☆31Sep 9, 2019Updated 6 years ago
- kCFI Documentation☆15Apr 18, 2017Updated 8 years ago
- Samples for WLAN and Bluetooth☆14Dec 17, 2015Updated 10 years ago
- ☆13Oct 26, 2025Updated 4 months ago
- A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.☆11Jun 11, 2022Updated 3 years ago
- ☆11Jul 11, 2021Updated 4 years ago
- ☆16Aug 22, 2019Updated 6 years ago
- ☆19Jul 17, 2025Updated 8 months ago
- A debugger for CMake☆23Jan 4, 2020Updated 6 years ago
- Some exercises i did on VB.NET. Both the interface and the code.☆10Jul 12, 2012Updated 13 years ago
- Multi-variant execution (MVX) using hardware-assisted process virtualization (with Dune)☆18Aug 12, 2016Updated 9 years ago
- Collection of metadata of different Side Channel Attack datasets☆21Jul 4, 2023Updated 2 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Windows API tracer for malware (oldname: unitracer)☆120Oct 16, 2017Updated 8 years ago