Here are
21 public repositories
matching this topic...
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
Principled, lightweight C/C++ PE parser
Persistent IAT hooking application - based on bearparser
PE file viewer/editor for Windows, Linux and MacOS.
-
Updated
Jul 19, 2020
-
QMake
Cross-platform library for parsing and building PE\PE+ formats
Compiler / JIT / Linker. Zero dependencies
Library for tinkering with PE/PE+ binaries.
A DLL that performs IAT hooking
RE scripts, snippets (IDA, lief, gdb, etc.)
-
Updated
Mar 31, 2019
-
Python
A feature rich DLL injection library.
PE (x86) and PE+ (x64) files viewer, based on libpe.
An Empirical Study of The PE File Format through RUST & SQL
-
Updated
Jul 13, 2020
-
Rust
📦 A simple Windows x86 PE file packer without anti-debug
An open-source multi-platform Windows Portable Executable(PE) analyzing module
-
Updated
Jul 1, 2020
-
Python
GetTyp/GetType/GT2 - legacy file format detector
Inject a New Section to the pe-executable file
-
Updated
May 22, 2020
-
Python
📦 A simple Windows x86 PE file packer without anti-debug
Simple PE Format Parser written in C/C++ using Win32API
Improve this page
Add a description, image, and links to the
pe-format
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
pe-format
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.