mgeeky / PEInfoLinks
Another Portable Executable files analysing stuff
☆21Updated 14 years ago
Alternatives and similar repositories for PEInfo
Users that are interested in PEInfo are comparing it to the libraries listed below
Sorting:
- ☆26Updated 4 months ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Remove API hooks from a Beacon process.☆14Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Manually perform syscalls without going through any external API or DLL.☆18Updated 2 years ago
- A C port of b33f's UrbanBishop☆38Updated 4 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Updated 3 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- Unamanged PS with Named Pipes☆9Updated 4 years ago
- ☆15Updated last year
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- really ?☆12Updated last year
- ☆24Updated 3 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated 2 months ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- ☆31Updated 4 years ago
- A simple PE loader.☆26Updated 2 years ago
- PoC code from blog☆16Updated 5 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 6 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago
- ☆12Updated 5 years ago
- ☆12Updated 4 years ago
- ☆21Updated 4 years ago
- Dangling COM Keys Finder☆17Updated 3 years ago
- ☆17Updated 5 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 4 years ago
- ☆48Updated 4 years ago