A DLL that performs IAT hooking
-
Updated
Jul 6, 2018 - C++
A DLL that performs IAT hooking
GetTyp/GetType/GT2 - legacy file format detector
Binary executable tool
Inject a New Section to the pe-executable file
RE scripts, snippets (IDA, lief, gdb, etc.)
A Malware Prediction model that predicted if the PE format file is malicious or legitimate.
The reverse-engineering tool for Windows executables
Cross-platform library for parsing and building PE\PE+ formats
Persistent IAT hooking application - based on bearparser
A Virus to encourage veganism and deter against eating meat.
x86-64 executable creation example
A neural approach to malware detection in portable executables
Machine Learning Malware Detector
POEX is a library to access, load and manipulate PE (Portable Executable) files.
Heuristically recover relocations and imports from module memory dumps
Small visualizator for PE files
A lib to distinguish a shared library from an executable. Mostly for ELF, but some rudimentary (file name extension-based) support of windows was added.
Add a description, image, and links to the pe-format topic page so that developers can more easily learn about it.
To associate your repository with the pe-format topic, visit your repo's landing page and select "manage topics."