PeNet 0.9.0-alpha

This is a prerelease version of PeNet.
There is a newer version of this package available.
See the version list below for details.
dotnet add package PeNet --version 0.9.0-alpha
                    
NuGet\Install-Package PeNet -Version 0.9.0-alpha
                    
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="PeNet" Version="0.9.0-alpha" />
                    
For projects that support PackageReference, copy this XML node into the project file to reference the package.
<PackageVersion Include="PeNet" Version="0.9.0-alpha" />
                    
Directory.Packages.props
<PackageReference Include="PeNet" />
                    
Project file
For projects that support Central Package Management (CPM), copy this XML node into the solution Directory.Packages.props file to version the package.
paket add PeNet --version 0.9.0-alpha
                    
#r "nuget: PeNet, 0.9.0-alpha"
                    
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
#:package PeNet@0.9.0-alpha
                    
#:package directive can be used in C# file-based apps starting in .NET 10 preview 4. Copy this into a .cs file before any lines of code to reference the package.
#addin nuget:?package=PeNet&version=0.9.0-alpha&prerelease
                    
Install as a Cake Addin
#tool nuget:?package=PeNet&version=0.9.0-alpha&prerelease
                    
Install as a Cake Tool

PeNet is a Windows PE (Portable Executable) parser written in C#. It parses all PE header structures for x32 and x64. It supports the ImpHash algorithm which is popular in malware analysis. You can use it for string and pattern matching in PE files.

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 was computed.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed.  net9.0 was computed.  net9.0-android was computed.  net9.0-browser was computed.  net9.0-ios was computed.  net9.0-maccatalyst was computed.  net9.0-macos was computed.  net9.0-tvos was computed.  net9.0-windows was computed.  net10.0 was computed.  net10.0-android was computed.  net10.0-browser was computed.  net10.0-ios was computed.  net10.0-maccatalyst was computed.  net10.0-macos was computed.  net10.0-tvos was computed.  net10.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 was computed. 
.NET Framework net461 is compatible.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (12)

Showing the top 5 NuGet packages that depend on PeNet:

Package Downloads
Microsoft.CST.AttackSurfaceAnalyzer

Microsoft Attack Surface Analyzer is an open source security tool that analyzes the attack surface of a target system and reports on potential security vulnerabilities introduced during the installation of software or system misconfiguration. This package contains the AttackSurfaceAnalyzer library. For the CLI Dotnet Tool, see Microsoft.CST.AttackSurfaceAnalyzer.CLI.

Reloaded.Injector

Advanced DLL Injector capable of injecting x86 DLLs to x86 process from x64 processes.

PeNet.Analyzer

PeNet.Analyzer finds anomalies in Portable Executables (PE) files.

Vezel.Ruptura.Injection

Ruptura is a Windows DLL injection, function interception, and memory manipulation library for .NET. Ruptura injects a bundled native module into the target process, which then locates the .NET runtime in either framework-dependent or self-contained mode and initializes it, after which a user-specified managed assembly is executed - all without the user writing a single line of native code. Additionally, a library facilitating common function hooking and memory manipulation scenarios is available for use by the injected assembly. This package provides the infrastructure to inject the .NET runtime and assemblies into processes.

KarambaCommon

An interactive, parametric Finite Element program for beams and shells.

GitHub repositories (18)

Showing the top 18 popular GitHub repositories that depend on PeNet:

Repository Stars
microsoft/AttackSurfaceAnalyzer
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
NuGetPackageExplorer/NuGetPackageExplorer
Create, update and deploy Nuget Packages with a GUI
goatcorp/Dalamud
FFXIV plugin framework and API
qwqdanchun/DcRat
A simple remote tool in C#.
Flangvik/SharpDllProxy
Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading
xivdev/Penumbra
FINAL FANTASY XIV modding, but actually good this time
knight0x07/ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
redteamsocietegenerale/DLLirant
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
ncatlin/rgat
An instruction trace visualisation tool for dynamic program analysis
microsoft/OSSGadget
Collection of tools for analyzing open source packages.
b4rtik/RedPeanut
RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.
DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
advanced-threat-research/DotDumper
An automatic unpacker and logger for DotNet Framework targeting files
n1xbyte/donutCS
dem sharp donuts
DosX-dev/PE-LiteScan
A simple crossplatform heuristic PE-analyzer
Reloaded-Project/Reloaded.Injector
C# DLL Injection Library capable of injecting x86 DLLs to x86 process from x64 processes.
Grinchiest/SantaRat
A remote access trojan to use against Santa's laptop!
hedge-dev/HedgeModManager
Multiplatform rewrite of Hedge Mod Manager
Version Downloads Last Updated
5.1.0 14,462 4/16/2025
5.0.0 542 4/12/2025
4.1.5 769 4/6/2025
4.1.4 228 4/5/2025
4.1.3 558 4/2/2025
4.1.2 3,999 3/16/2025
4.1.1 17,595 11/24/2024
4.1.0 9,917 9/23/2024
4.0.5 10,875 5/25/2024
4.0.4 12,952 12/22/2023
4.0.3 994 12/6/2023
4.0.2 2,830 9/22/2023
4.0.1 3,087 8/8/2023
3.0.0 8,975 2/1/2023
3.0.0-pre7 295 1/4/2023
3.0.0-pre6 249 12/12/2022
3.0.0-pre5 259 12/6/2022
3.0.0-pre4 399 11/15/2022
3.0.0-pre3 220 11/9/2022
3.0.0-pre2 217 11/9/2022
3.0.0-pre1 260 10/21/2022
2.9.9 8,726 9/26/2022
2.9.9-pre1 300 9/19/2022
2.9.8 3,709 7/8/2022
2.9.8-pre1 283 7/7/2022
2.9.7 36,916 2/17/2022
2.9.6 1,341 2/10/2022
2.9.5 1,397 2/9/2022
2.9.4 1,294 1/30/2022
2.9.3 1,673 1/17/2022
2.9.2 9,867 12/8/2021
2.9.1 4,932 10/13/2021
2.9.0 738 10/6/2021
2.8.1 7,135 8/27/2021
2.8.0 1,086 8/17/2021
2.7.0 567 8/17/2021
2.6.4 19,508 8/4/2021
2.6.4-pre1 358 8/1/2021
2.6.3 19,791 4/27/2021
2.6.2 1,559 3/15/2021
2.6.1 1,883 2/17/2021
2.6.1-pre1 347 2/15/2021
2.6.0 3,559 12/7/2020
2.6.0-alpha1 420 12/5/2020
2.5.1 802 12/1/2020
2.5.1-alpha1 904 11/25/2020
2.5.0 797 11/22/2020
2.4.2 1,647 10/27/2020
2.4.1 841 10/5/2020
2.4.1-alpha2 409 9/21/2020
2.4.0 43,185 6/18/2020
2.4.0-alpha2 505 6/11/2020
2.4.0-alpha1 723 6/10/2020
2.3.1 933 6/11/2020
2.3.0 1,490 6/5/2020
2.3.0-alpha2 469 6/2/2020
2.3.0-alpha1 472 6/2/2020
2.2.7 3,705 5/18/2020
2.2.6 3,384 5/7/2020
2.2.5 931 5/7/2020
2.2.4 947 5/6/2020
2.2.3 940 5/6/2020
2.2.2 744 5/6/2020
2.2.1 845 5/4/2020
2.2.0 932 4/25/2020
2.1.0 914 4/17/2020
2.1.0-alpha1 619 4/12/2020
2.0.0 1,924 3/20/2020
2.0.0-alpha.3 424 3/14/2020
2.0.0-alpha.2 410 3/14/2020
2.0.0-alpha.1 432 3/13/2020
1.6.1 8,525 3/12/2020
1.6.0 966 2/26/2020
1.5.3 5,124 1/7/2020
1.5.2 708 1/7/2020
1.5.1 832 1/7/2020
1.5.0 1,927 12/31/2019
1.4.0 769 12/20/2019
1.3.5 731 12/20/2019
1.3.3 991 12/18/2019
1.3.2 783 12/13/2019
1.3.1 758 12/12/2019
1.3.0 792 12/11/2019
1.3.0-prerelease 538 12/11/2019
1.2.0 794 12/6/2019
1.1.2 802 12/4/2019
1.1.1 20,991 10/17/2019
1.1.0 1,471 10/1/2019
1.0.9 1,297 8/13/2019
1.0.8 1,293 7/17/2019
1.0.7 1,647 6/7/2019
1.0.5 1,133 5/6/2019
1.0.4 1,437 4/18/2019
1.0.3 1,315 4/3/2019
1.0.2 979 4/1/2019
1.0.1 2,927 2/13/2019
1.0.0 916 2/11/2019
0.9.1 6,774 2/8/2019
0.9.0 903 2/8/2019
0.9.0-alpha 700 2/6/2019
0.8.2 2,131 1/14/2019
0.8.1 16,714 12/4/2018
0.8.0 1,706 10/25/2018
0.7.1 1,035 10/15/2018
0.7.0 40,804 5/24/2018
0.6.8 6,978 2/14/2018
0.6.7 1,998 1/10/2018
0.6.6 1,600 12/22/2017
0.6.5 1,458 12/21/2017
0.6.5-alpha 1,049 12/20/2017
0.6.4 1,451 12/19/2017
0.6.3 1,689 12/14/2017
0.6.2 1,439 12/12/2017
0.6.1 1,463 12/9/2017
0.6.0 1,553 12/8/2017
0.5.3 11,322 10/3/2017
0.5.2 1,534 9/16/2017
0.5.1 1,487 9/14/2017
0.5.0 2,201 9/4/2017
0.4.6 3,670 11/16/2016
0.4.5 1,472 11/9/2016
0.4.4 1,671 11/8/2016
0.4.3 1,378 10/30/2016
0.4.2 1,301 10/27/2016
0.4.1 1,601 8/14/2016
0.4.0 1,443 6/16/2016
0.3.9 1,369 6/3/2016
0.3.8 1,372 6/2/2016
0.3.7 1,336 5/30/2016
0.3.6 1,347 5/29/2016
0.3.5 1,354 5/25/2016
0.3.4 1,329 5/25/2016
0.3.3 1,376 5/25/2016
0.3.2 1,331 5/25/2016
0.3.1 1,352 5/17/2016
0.3.0 1,432 3/14/2016
0.2.9 1,301 3/7/2016
0.2.8 1,666 2/26/2016
0.2.7 1,357 2/23/2016
0.2.6 1,477 2/22/2016
0.2.5 1,369 2/18/2016
0.2.4 1,455 2/1/2016
0.2.3 1,413 12/14/2015
0.2.2 1,583 12/4/2015
0.2.1 1,578 12/4/2015
0.2.0 1,672 12/4/2015
0.1.9 1,440 12/4/2015
0.1.8 1,595 12/3/2015
0.1.7 1,573 11/27/2015
0.1.6 1,449 9/15/2015
0.1.5 1,402 9/10/2015
0.1.4 1,422 8/28/2015
0.1.3 1,520 7/28/2015
0.1.2 1,450 7/20/2015
0.1.1 1,404 7/12/2015
0.1.0 1,473 7/2/2015
0.0.0 881 12/31/2019

Fix broken parsing of Asn1 structures in certificates.