mrfearless / PE-Library-x86
PE Library x86
☆20Updated 5 years ago
Related projects: ⓘ
- ☆23Updated this week
- win32/x64 obfuscate framework☆32Updated 5 years ago
- Static library and headers for linking your software with ntdll.dll☆30Updated 4 years ago
- unicorn emulator for x64dbg☆30Updated 6 years ago
- ☆13Updated this week
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆49Updated 6 months ago
- Helper utility for debugging windows PE/PE+ loader.☆49Updated 9 years ago
- Library for using direct system calls☆35Updated 4 years ago
- ☆27Updated this week
- Analysing and defeating PatchGuard universally☆34Updated 3 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆22Updated 9 years ago
- An API Monitor based on Instrumentation☆40Updated 6 years ago
- x64 injector using LoadLibrary made in assembler (MASM)☆24Updated 6 years ago
- WIP python3 plugin for x64dbg☆14Updated 3 years ago
- x64dbg scripts for finding OEP of packers☆14Updated 5 years ago
- Wow64 syscall hook☆39Updated 7 years ago
- just an lite AntiRootkit for interesting☆23Updated 8 years ago
- 🧶 The Win32 usermode threading library with UMS/fibers/threads support☆29Updated 5 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆41Updated 2 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆37Updated 6 years ago
- ☆19Updated this week
- ☆31Updated this week
- a binary x86win32 code obfuscator using virtual machine☆32Updated 7 years ago
- Open Source Libraries Collection☆24Updated 8 years ago
- ☆17Updated this week
- Analyze PatchGuard☆53Updated 6 years ago
- Screen recorder for x64dbg, for recording screen while debugging.☆11Updated 8 years ago
- Remote memory library in C++17.☆30Updated 6 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆21Updated 7 years ago