There are 5 repositories under pe-loader topic.
A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl
The BEST DLL Injector Library.
A library for loading dll module bypassing windows PE loader from memory (x86/x64)
Generic PE loader for fast prototyping evasion techniques
A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.
A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.
A Windows PE loader / manual mapper for executables (x86 and x64) with full TLS (Thread Local Storage) support.
The BEST DLL Injector Library.
Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping
Nim process hollowing loader
execute PE in memory Filelessly
The sleek new way to load Win64 DLLs straight from memory — no disk, no traces, no limits.
Loads a native Windows assembly... right from your .NET embedded resources. Works on all modern .NET platforms.
PE .exe packer and manual loader for Windows with compression, encryption, and much more
The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers
A class to gather information about a process, its threads and modules.
Advanced Windows application loader featuring secure authentication, automatic updates, and in-memory PE execution. Built with C++, ImGui, and DirectX 9.
A small library to extend the functionality of GetModuleHandle and GetProcAddress to other processes
Modular C2 loader featuring dynamic function encryption, in-memory payload support, and a covert DoH command channel, configurable via a Python builder and a Node.js web panel.
A PE Loader that can hide instruction and memory data in the sleep time.
The magnificent hooking framework for Driv3r.
Minimal in-memory PE loader
Windows Portable Executable Loader Library
A simple template PE Packer (x64)
This package uses PyPeLoader to load a PE program from a HTTP server (from an URL).