zodiacon / TotalPE2
PE Viewer
☆163Updated last week
Alternatives and similar repositories for TotalPE2:
Users that are interested in TotalPE2 are comparing it to the libraries listed below
- Explore Kernel Objects on Windows☆201Updated last year
- Advanced driver monitoring utility.☆202Updated 2 years ago
- Yet another PE Viewer☆137Updated 2 years ago
- Single header version of System Informer's phnt library.☆192Updated this week
- Elevate a process to be a protected process☆144Updated 5 years ago
- A bunch of parsers for PE and PDB formats in C++☆230Updated 8 months ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆90Updated last week
- Browse Page Tables on Windows (Page Table Viewer)☆194Updated 2 years ago
- Comparing, discussing, and bypassing various techniques for suspending and freezing processes on Windows.☆117Updated 3 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆200Updated 3 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆260Updated 2 years ago
- Use ci.dll API for validating Authenticode signature of files☆137Updated 2 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆268Updated 3 months ago
- Collection of undocumented Windows API declarations.☆300Updated 2 weeks ago
- Enhanced version of the classic Spy++ tool☆180Updated 10 months ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆241Updated this week
- A global injection and hooking example☆135Updated last year
- APC Internals Research Code☆161Updated 4 years ago
- A Windows PE format file loader☆139Updated 6 years ago
- Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers☆202Updated this week
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆132Updated 5 years ago
- Reverse engineering winapi function loadlibrary.☆80Updated last year
- Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆167Updated 2 years ago
- Debugger Anti-Detection Benchmark☆303Updated last year
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆139Updated 5 years ago
- Run Processes as PPL with ELAM☆153Updated 2 years ago
- Samples for the book Windows Kernel Programming, 2nd edition☆317Updated last month
- This is a collection of interesting codes about Windows Process creation.☆233Updated last year
- Authenticode Hash Calculator for PE32/PE32+ files☆108Updated 11 months ago
- Kernel LdrLoadDll injector☆259Updated 6 years ago