polycone / pe-loader
A Windows PE format file loader
☆141Updated 6 years ago
Alternatives and similar repositories for pe-loader:
Users that are interested in pe-loader are comparing it to the libraries listed below
- A modern c++ implementation of windows heavens gate☆217Updated 4 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆135Updated 5 years ago
- Asynchronous Procedure Calls☆221Updated 3 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆95Updated 2 months ago
- APC Internals Research Code☆162Updated 4 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆87Updated 9 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆209Updated 5 years ago
- Research on Windows Kernel Executive Callback Objects☆286Updated 5 years ago
- Translates WinDbg "dt" structure dump to a C structure☆128Updated 8 years ago
- usermode standalone kernel interface☆111Updated 6 years ago
- A header-only C++ library for accessing files in COFF binary format. (Including Windows PE/PE+ formats)☆193Updated 2 weeks ago
- Vectored Exception Handling Hooking Class☆153Updated 6 years ago
- Windows inline hooking tool.☆251Updated 6 years ago
- System call hook for Windows 10 20H1☆483Updated 3 years ago
- Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆167Updated 3 years ago
- A Windows kernel dump C++ parser library with Python 3 bindings.☆199Updated 8 months ago
- API Set resolver for Windows☆129Updated 6 months ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆139Updated 6 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆56Updated 3 years ago
- C++ Exceptions in Windows Drivers☆205Updated 4 years ago
- COFF and Portable Executable format described using standard C++ with no dependencies.☆278Updated last month
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆307Updated 2 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆203Updated 3 years ago
- Collection of undocumented Windows API declarations.☆306Updated last week
- A native hypervisor designed for the Windows operating system☆122Updated 4 years ago
- Advanced driver monitoring utility.☆207Updated 2 years ago
- Windows NT x64 syscall fuzzer☆598Updated last year
- Some Code Samples for Windows based Inter-Process-Communication (IPC)☆171Updated last year
- Collect different versions of Crucial modules.☆130Updated 8 months ago