ytk2128 / pe32-passwordLinks
A simple password-based PE encryptor for Windows 32-bit executables.
☆53Updated 9 months ago
Alternatives and similar repositories for pe32-password
Users that are interested in pe32-password are comparing it to the libraries listed below
Sorting:
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 2 years ago
- A Windows API hooking library !☆31Updated 3 years ago
- Windows kernel driver template for cmkr and llvm-msvc.☆33Updated last year
- Debug Print viewer (user and kernel)☆67Updated last year
- 🧶 The Win32 usermode threading library with UMS/fibers/threads support☆30Updated 6 years ago
- Add an empty section to a PE file☆53Updated 8 years ago
- ☆31Updated 3 years ago
- Library for linking multiple PE\PE + files to one☆52Updated last year
- Library for using direct system calls☆36Updated 8 months ago
- Application Verifier Dynamic Fault Injection☆39Updated last month
- Lightweight x86-64 disassembling library☆44Updated 3 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆78Updated 6 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Updated 4 years ago
- Miscellaneous Code and Docs☆84Updated 3 months ago
- Small project to generate fake DLLs based on an executable's import table☆24Updated 5 years ago
- .lib file for linking against the NT CRT☆19Updated 3 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆47Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Updated 4 years ago
- Static library and headers for linking your software with ntdll.dll☆36Updated 5 years ago
- c++ implementation of windows heavens gate☆70Updated 4 years ago
- Signature scanner and API hooks to detect malicious process injection☆27Updated 2 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- Elevate arbitrary MSR writes to kernel execution.☆38Updated 2 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆73Updated last year
- ☆56Updated 5 months ago
- Code from process of reversing Sysinternals Suite for educational purposes, with videos to associate them☆48Updated 2 years ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Updated 6 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago