POEX is a library to access, load and manipulate PE (Portable Executable) files.
-
Updated
Apr 1, 2023 - C++
POEX is a library to access, load and manipulate PE (Portable Executable) files.
Divas is a hobbyist's approach into disassembling AMD64 based ELF and PE Executables which can read section header and Executable-specfic parameters in a compact manner.
A simple template PE Packer (x64)
Updated version of the Atom PE Packer, with a FUD stub that bypasses windows defender! Enjoy!
load PE in memory Filelessly
The magnificent hooking framework for Driv3r.
A library for loading dll module bypassing windows PE loader from memory (x86/x64)
C library that is intended for providing methods for executing and injecting code.
The BEST DLL Injector Library.
A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes
A class to gather information about a process, its threads and modules.
RE scripts, snippets (IDA, lief, gdb, etc.)
EasyWinHax is a C++ library designed to provide basic and low abstraction functionallity for windows process hacking and more specifically game hacking.
A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal console builder.
Loads a native Windows assembly... right from your .NET embedded resources. Works on all modern .NET platforms.
Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping
Nim process hollowing loader
Add a description, image, and links to the pe-loader topic page so that developers can more easily learn about it.
To associate your repository with the pe-loader topic, visit your repo's landing page and select "manage topics."