There are 12 repositories under pe topic.
A bridge/proxy allowing you to connect to Minecraft: Java Edition servers with Minecraft: Bedrock Edition.
LIEF - Library to Instrument Executable Formats (C++, Python, Rust)
Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors
Stealing Signatures and Making One Invalid Signature at a Time
A library for creating, reading and editing PE files and .NET modules.
Run a Exe File (PE Module) in memory (like an Application Loader)
Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Portable Executable parsing library (from PE-bear)
Hybrid mode plugin to allow for connections from Geyser to join online mode servers.
Resources About Windows Security. 1100+ Open Source Tools. 3300+ Blog Post and Videos.
The dissection of a simple "hello world" ELF binary.
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engineering.(使用C和Intel x86汇编开发的Windows x86可执行文件打包工具,打包后的新文件可以阻碍逆向工程。)
COFF and Portable Executable format described using standard C++ with no dependencies.
PEiD detects most common packers, cryptors and compilers for PE files.
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Search for code cave in all binaries
Persistent IAT hooking application - based on bearparser
An awesome list of Platform Engineering 平台工程列表
Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
DLL Injector (LoadLibrary) in C++ (x86 / x64) - LoadLibrary DLL injector
A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode.