PeNet 0.1.6

There is a newer version of this package available.
See the version list below for details.
dotnet add package PeNet --version 0.1.6
NuGet\Install-Package PeNet -Version 0.1.6
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="PeNet" Version="0.1.6" />
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add PeNet --version 0.1.6
#r "nuget: PeNet, 0.1.6"
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install PeNet as a Cake Addin
#addin nuget:?package=PeNet&version=0.1.6

// Install PeNet as a Cake Tool
#tool nuget:?package=PeNet&version=0.1.6

PeNet is a Windows PE parser written in C# without any usage of the native API or PInvoke. It supports the ImpHash algorithm which is popular in malware analysis.

Product Compatible and additional computed target framework versions.
.NET Framework net is compatible. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

This package has no dependencies.

NuGet packages (8)

Showing the top 5 NuGet packages that depend on PeNet:

Package Downloads
Microsoft.CST.AttackSurfaceAnalyzer The ID prefix of this package has been reserved for one of the owners of this package by NuGet.org.

Microsoft Attack Surface Analyzer is an open source security tool that analyzes the attack surface of a target system and reports on potential security vulnerabilities introduced during the installation of software or system misconfiguration. This package contains the AttackSurfaceAnalyzer library. For the CLI Dotnet Tool, see Microsoft.CST.AttackSurfaceAnalyzer.CLI.

Reloaded.Injector

Advanced DLL Injector capable of injecting x86 DLLs to x86 process from x64 processes.

PeNet.Analyzer

PeNet.Analyzer finds anomalies in Portable Executables (PE) files.

Vezel.Ruptura.Injection The ID prefix of this package has been reserved for one of the owners of this package by NuGet.org.

Ruptura is a Windows DLL injection, function interception, and memory manipulation library for .NET. Ruptura injects a bundled native module into the target process, which then locates the .NET runtime in either framework-dependent or self-contained mode and initializes it, after which a user-specified managed assembly is executed - all without the user writing a single line of native code. Additionally, a library facilitating common function hooking and memory manipulation scenarios is available for use by the injected assembly. This package provides the infrastructure to inject the .NET runtime and assemblies into processes.

KarambaCommon

An interactive, parametric Finite Element program for beams and shells.

GitHub repositories (15)

Showing the top 5 popular GitHub repositories that depend on PeNet:

Repository Stars
microsoft/AttackSurfaceAnalyzer
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
NuGetPackageExplorer/NuGetPackageExplorer
Create, update and deploy Nuget Packages with a GUI
goatcorp/Dalamud
FFXIV plugin framework and API
qwqdanchun/DcRat
A simple remote tool in C#.
Flangvik/SharpDllProxy
Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading
Version Downloads Last updated
4.0.4 5,119 12/22/2023
4.0.3 780 12/6/2023
4.0.2 2,173 9/22/2023
4.0.1 1,980 8/8/2023
3.0.0 7,162 2/1/2023
3.0.0-pre7 204 1/4/2023
3.0.0-pre6 151 12/12/2022
3.0.0-pre5 164 12/6/2022
3.0.0-pre4 224 11/15/2022
3.0.0-pre3 130 11/9/2022
3.0.0-pre2 122 11/9/2022
3.0.0-pre1 177 10/21/2022
2.9.9 7,463 9/26/2022
2.9.9-pre1 208 9/19/2022
2.9.8 3,447 7/8/2022
2.9.8-pre1 169 7/7/2022
2.9.7 25,007 2/17/2022
2.9.6 1,111 2/10/2022
2.9.5 1,119 2/9/2022
2.9.4 1,107 1/30/2022
2.9.3 1,492 1/17/2022
2.9.2 7,288 12/8/2021
2.9.1 3,059 10/13/2021
2.9.0 583 10/6/2021
2.8.1 5,999 8/27/2021
2.8.0 859 8/17/2021
2.7.0 440 8/17/2021
2.6.4 11,551 8/4/2021
2.6.4-pre1 247 8/1/2021
2.6.3 17,293 4/27/2021
2.6.2 1,318 3/15/2021
2.6.1 1,738 2/17/2021
2.6.1-pre1 227 2/15/2021
2.6.0 3,319 12/7/2020
2.6.0-alpha1 291 12/5/2020
2.5.1 665 12/1/2020
2.5.1-alpha1 765 11/25/2020
2.5.0 657 11/22/2020
2.4.2 1,448 10/27/2020
2.4.1 707 10/5/2020
2.4.1-alpha2 303 9/21/2020
2.4.0 28,262 6/18/2020
2.4.0-alpha2 382 6/11/2020
2.4.0-alpha1 581 6/10/2020
2.3.1 788 6/11/2020
2.3.0 1,321 6/5/2020
2.3.0-alpha2 338 6/2/2020
2.3.0-alpha1 346 6/2/2020
2.2.7 3,453 5/18/2020
2.2.6 3,098 5/7/2020
2.2.5 762 5/7/2020
2.2.4 767 5/6/2020
2.2.3 825 5/6/2020
2.2.2 606 5/6/2020
2.2.1 696 5/4/2020
2.2.0 778 4/25/2020
2.1.0 762 4/17/2020
2.1.0-alpha1 487 4/12/2020
2.0.0 1,675 3/20/2020
2.0.0-alpha.3 305 3/14/2020
2.0.0-alpha.2 292 3/14/2020
2.0.0-alpha.1 308 3/13/2020
1.6.1 8,048 3/12/2020
1.6.0 825 2/26/2020
1.5.3 4,132 1/7/2020
1.5.2 582 1/7/2020
1.5.1 686 1/7/2020
1.5.0 1,714 12/31/2019
1.4.0 630 12/20/2019
1.3.5 594 12/20/2019
1.3.3 869 12/18/2019
1.3.2 647 12/13/2019
1.3.1 622 12/12/2019
1.3.0 651 12/11/2019
1.3.0-prerelease 420 12/11/2019
1.2.0 644 12/6/2019
1.1.2 659 12/4/2019
1.1.1 19,765 10/17/2019
1.1.0 1,315 10/1/2019
1.0.9 1,139 8/13/2019
1.0.8 1,153 7/17/2019
1.0.7 1,441 6/7/2019
1.0.5 982 5/6/2019
1.0.4 1,287 4/18/2019
1.0.3 1,160 4/3/2019
1.0.2 848 4/1/2019
1.0.1 2,758 2/13/2019
1.0.0 765 2/11/2019
0.9.1 6,392 2/8/2019
0.9.0 762 2/8/2019
0.9.0-alpha 559 2/6/2019
0.8.2 1,937 1/14/2019
0.8.1 13,117 12/4/2018
0.8.0 1,512 10/25/2018
0.7.1 875 10/15/2018
0.7.0 38,564 5/24/2018
0.6.8 6,409 2/14/2018
0.6.7 1,650 1/10/2018
0.6.6 1,246 12/22/2017
0.6.5 1,110 12/21/2017
0.6.5-alpha 815 12/20/2017
0.6.4 1,106 12/19/2017
0.6.3 1,440 12/14/2017
0.6.2 1,101 12/12/2017
0.6.1 1,114 12/9/2017
0.6.0 1,195 12/8/2017
0.5.3 7,860 10/3/2017
0.5.2 1,285 9/16/2017
0.5.1 1,232 9/14/2017
0.5.0 1,838 9/4/2017
0.4.6 2,719 11/16/2016
0.4.5 1,208 11/9/2016
0.4.4 1,417 11/8/2016
0.4.3 1,115 10/30/2016
0.4.2 1,043 10/27/2016
0.4.1 1,335 8/14/2016
0.4.0 1,178 6/16/2016
0.3.9 1,109 6/3/2016
0.3.8 1,108 6/2/2016
0.3.7 1,077 5/30/2016
0.3.6 1,089 5/29/2016
0.3.5 1,083 5/25/2016
0.3.4 1,070 5/25/2016
0.3.3 1,109 5/25/2016
0.3.2 1,068 5/25/2016
0.3.1 1,090 5/17/2016
0.3.0 1,153 3/14/2016
0.2.9 1,039 3/7/2016
0.2.8 1,390 2/26/2016
0.2.7 1,096 2/23/2016
0.2.6 1,227 2/22/2016
0.2.5 1,105 2/18/2016
0.2.4 1,174 2/1/2016
0.2.3 1,140 12/14/2015
0.2.2 1,327 12/4/2015
0.2.1 1,327 12/4/2015
0.2.0 1,411 12/4/2015
0.1.9 1,172 12/4/2015
0.1.8 1,322 12/3/2015
0.1.7 1,302 11/27/2015
0.1.6 1,184 9/15/2015
0.1.5 1,157 9/10/2015
0.1.4 1,155 8/28/2015
0.1.3 1,247 7/28/2015
0.1.2 1,187 7/20/2015
0.1.1 1,125 7/12/2015
0.1.0 1,210 7/2/2015
0.0.0 711 12/31/2019

Added function to parse the CRL URLs from a certificate.