mgeeky / PE-library
Lightweight Portable Executable parsing library and a demo peParser application.
☆75Updated last year
Related projects ⓘ
Alternatives and complementary repositories for PE-library
- Library for using direct system calls☆35Updated 4 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- Static library and headers for linking your software with ntdll.dll☆30Updated 4 years ago
- Resolve DOS MZ executable symbols at runtime☆93Updated 3 years ago
- Sample project that encrypts windows 32-bit executables with password☆51Updated 2 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆26Updated 3 years ago
- A simple rootkit to hide a process☆45Updated 10 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆83Updated last year
- A ready-made template for a project based on libpeconv.☆42Updated last month
- Debug Print viewer (user and kernel)☆63Updated 9 months ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- Code Injection technique written in cpp language☆31Updated 6 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆73Updated 5 years ago
- c++ implementation of windows heavens gate☆55Updated 3 years ago
- A driver to intercept low level windows events☆60Updated 5 years ago
- GetHooks is a program designed for the passive detection and monitoring of hooks from a limited user account.☆61Updated 3 years ago
- Position-idependent Windows DLL loader based on ReflectiveDLL project.☆92Updated 6 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- A Windows API hooking library !☆29Updated 2 years ago
- LSASS INJECTOR☆33Updated 5 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆69Updated last year
- C++ library for low-level Windows development☆71Updated 7 months ago
- Yet another Windows DLL injector.☆38Updated 3 years ago
- Demo service that runs in svchost.exe☆79Updated 6 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆73Updated 13 years ago
- X86/X64 Hardware Breakpoint Manager☆39Updated 3 years ago
- Implementation of a dispatcher for Structured Exceptions inside a Vectored Exception Handler☆37Updated 4 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆102Updated 4 years ago