POEX is a library to access, load and manipulate PE (Portable Executable) files.
-
Updated
Apr 1, 2023 - C++
POEX is a library to access, load and manipulate PE (Portable Executable) files.
Divas is a hobbyist's approach into disassembling AMD64 based ELF and PE Executables which can read section header and Executable-specfic parameters in a compact manner.
A simple template PE Packer (x64)
Offering FUD Crypter encryption services for executables fully bypassing windows defender. Willing to negotiate prices. Contact me here: @NetNobody18
load PE in memory Filelessly
The BEST DLL Injector Library.
The magnificent hooking framework for Driv3r.
A library for loading dll module bypassing windows PE loader from memory (x86/x64)
C library that is intended for providing methods for executing and injecting code.
A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal console builder.
RE scripts, snippets (IDA, lief, gdb, etc.)
A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes
Nim process hollowing loader
Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping
A class to gather information about a process, its threads and modules.
Loads a native Windows assembly... right from your .NET embedded resources. Works on all modern .NET platforms.
EasyWinHax is a C++ library designed to provide basic and low abstraction functionallity for windows process hacking and more specifically game hacking.
Add a description, image, and links to the pe-loader topic page so that developers can more easily learn about it.
To associate your repository with the pe-loader topic, visit your repo's landing page and select "manage topics."