搜索资源列表
CodeInject
- windows下PE文件代码注入,功能比较简单,适合新手学习用-PE file code into the windows, the function is relatively simple, suitable for novice to learn to use
PEJmpTest
- 简单的给PE文件加密/解密,功能简单,适合学习-Simple PE file encryption/decryption, simple functions, for learning
56F801XCEPWM
- it is a pdf profile about PWM project bulit by PE through code warrior
PERZYNA-PE
- PERZYNA-PLAIN STRAIN
Shell2
- 本程序对PE文件进行分析处理,尅修改PE文件的入口点-This procedure PE file, grams to modify the PE file' s entry point
PEInfo
- C语言和SDK实现,解析PE格式文件,比如导入表,导出表,资源,重定位表等-C the language+SDK achieve parsing PE file
Win32-Binary-PE-File-Resource-Formats
- Win32 Binary Resource Formats, Floyd Rogers It describes the binary format of resources in Win32.
C-Sharp-language-lecture-series
- C#语言系列讲座 我们知道,C#编译后的PE文件主要由IL代码和元数据组成,元数据为.NET组件提供了丰富的自描述特性,它使得我们可以在代码运行时获知组件中的类型等重要的信息。在C#中这是通过一种称做映射(Reflection)的机制来完成的。先看一个示例,在此首先创建一个简单的类型:-C# language lecture series, we know that the PE file in C# compiler mainly by the IL code and meta data,
IPELoadern
- 在驱动中加载PE,实现方法比较较简单,值得一看-PELoader -Load in the drive in PE, the method is relatively simple, and worth a visit-PELoader
PETool
- 解析PE 文件的工具,可以导入一个文件,查看导入表,导出表,各种信息。-Tool to parse the PE file, you can import a file to view the import table, export table, all kinds of information.
GetInfo
- 对可执行程序PE格式分析,输入输出表,资源表以及数据目录遍历-PE format executable program analysis, input-output tables, resource tables, and data directory traversal
ModifyPE
- 根据对PE格式的分析,修改PE文件,以实现特定的效果。-Based on the analysis of the PE format, modify PE file, in order to achieve a particular effect.
PEInfo_example
- PE结构的稳中各部分读出。对加壳脱壳很有用。-The PE structure steady each part read out. Packers shelling useful.
WindowsPE-source-code
- windows PE一书的源代码,转作者的声明:第23章有个病毒样例,破坏模块仅仅在c盘建立一个文件夹,放心使用,但是需要关闭杀毒软件-windows PE source code in a book, turn of the statement: Chapter 23 virus sample, destruction module just create a folder in the c drive, ease of use, but need to turn off anti-virus
WinHook
- windows下的挂钩c,pe挂钩的实现例子 最精炼的apihook代码 编程高手箴言 -windows下的挂钩c,pe挂钩的实现例子 最精炼的apihook代码 编程高手箴言
unpack-themida
- Themida的另类破解 附件提供的一个程序是用汇编写的PE信息小工具,用Themida1855加密,加密选择RISC-64 processor,全选加密可选项,并对部分API函数使用VM加密,入口虚拟系数选择15。
winasm
- 汇编语言全接触,基于masmplus的资料非常全。包括Iczelion 的win32汇编教程、ODBD教程、Vxd教程,PE教程, 罗云彬的win32汇编教程,还有些加密解码等资料-Keys assembly language, based on the masmplus 。the information is very full, including Iczelion s win32 compilation tutorial, ODBD tutorial, Vxd tutorial,
PETotal
- 可以看可执行文件(exe,dll,sys)的版本信息, PE头信息(可用于效验文件的三个字段)和 这个可执行文件使用的DLL和函数,以及输出地函数接口-
bpsk_ofdm
- 使用BOSK数据调制 Use a FOR-loop to simulate the Pe-Eb/No performance for Eb/No=0--35dB. For each Eb/No, at least 500 bit errors should be produced.-1. Use BPSK data modulation instead of QPSK data modulation 2. Use a FOR-loop to simulate the Pe-Eb
cryptor0_2
- PE-Cryptor for (EXE,DLL) crypting iat,reloc,code (FASM)