POEX is a library to access, load and manipulate PE (Portable Executable) files.
-
Updated
Apr 1, 2023 - C++
POEX is a library to access, load and manipulate PE (Portable Executable) files.
EXE Checksum manipulator
A Virus to encourage veganism and deter against eating meat.
Warm greetings to ESET! x86-64 executable creation example
Proof of concept DLL injector utilizing LoadLibraryA
The BEST DLL Injector Library.
A lib to distinguish a shared library from an executable. Mostly for ELF, but some rudimentary (file name extension-based) support of windows was added.
Attack tool for altering packed samples so that they evade static packing detection
GetTyp/GetType/GT2 - legacy file format detector
The reverse-engineering tool for Windows executables
Heuristically recover relocations and imports from module memory dumps
A DLL that performs IAT hooking
SDA is a rich cross-platform tool for reverse engineering that focused firstly on analysis of computer games. I'm trying to create a mix of the Ghidra, Cheat Engine and x64dbg. My tool will combine static and dynamic analysis of programs. Now SDA is being developed.
Cross-platform library for parsing and building PE\PE+ formats
Library for parsing internal structures of PE32/PE32+ binary files.
PE32 (x86) and PE32+ (x64) binaries analysis tool, resources viewer/extractor.
A bunch of parsers for PE and PDB formats in C++
Persistent IAT hooking application - based on bearparser
Principled, lightweight C/C++ PE parser
Add a description, image, and links to the pe-format topic page so that developers can more easily learn about it.
To associate your repository with the pe-format topic, visit your repo's landing page and select "manage topics."