Highlights
- Pro
Pinned Loading
-
WindowsProcessAnalysisAndDumping
WindowsProcessAnalysisAndDumping PublicA Windows process memory parser that opens a running process i.e. “notepad.exe” or any .exe and parse the .exe PEB data structure and extract the PEB fields.
C++
-
IEEE-754-floating-point
IEEE-754-floating-point PublicProject part of Malware Analysis and Reverse Engineering course to understand IEEE 754 floating point
C
-
MyFirstWindowsDriver
MyFirstWindowsDriver PublicWindows10 Driver prints the CPUID info and Process Monitor
C++ 2
-
PEParser
PEParser PublicProject part of Malware Analysis and Reverse Engineering course to write a static parser to extract the basic information of a legitimate 32-bit PE file
C
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.

