polycone / pe-loaderLinks
A Windows PE format file loader
☆145Updated 7 years ago
Alternatives and similar repositories for pe-loader
Users that are interested in pe-loader are comparing it to the libraries listed below
Sorting:
- A modern c++ implementation of windows heavens gate☆224Updated 4 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆140Updated 5 years ago
- Asynchronous Procedure Calls☆230Updated 4 years ago
- Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆172Updated 3 years ago
- System call hook for Windows 10 20H1☆493Updated 3 years ago
- APC Internals Research Code☆166Updated 4 years ago
- Translates WinDbg "dt" structure dump to a C structure☆127Updated 8 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆96Updated 4 months ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆322Updated 2 years ago
- Kernel LdrLoadDll injector☆260Updated 6 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆87Updated 9 years ago
- API Set resolver for Windows☆133Updated 8 months ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆219Updated 6 years ago
- Research on Windows Kernel Executive Callback Objects☆287Updated 5 years ago
- Analyze patches in a process☆253Updated 3 years ago
- x86 Binary Code Virtualization Tool☆213Updated 3 months ago
- x86-64 virtual machine and disassembler☆134Updated 5 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- Reflective PE loader for DLL injection☆175Updated 7 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆139Updated 7 months ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆201Updated 4 years ago
- COFF and Portable Executable format described using standard C++ with no dependencies.☆284Updated last month
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆268Updated 2 years ago
- C++ Exceptions in Windows Drivers☆210Updated 4 years ago
- A bunch of parsers for PE and PDB formats in C++☆246Updated last year
- Some Code Samples for Windows based Inter-Process-Communication (IPC)☆175Updated last year
- Manual DLL Injector using Thread Hijacking.☆238Updated 7 years ago
- Collection of undocumented Windows API declarations.☆314Updated this week
- Elevate a process to be a protected process☆150Updated 5 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆58Updated 4 years ago