PeNet 4.1.4

There is a newer version of this package available.
See the version list below for details.
dotnet add package PeNet --version 4.1.4
                    
NuGet\Install-Package PeNet -Version 4.1.4
                    
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="PeNet" Version="4.1.4" />
                    
For projects that support PackageReference, copy this XML node into the project file to reference the package.
<PackageVersion Include="PeNet" Version="4.1.4" />
                    
Directory.Packages.props
<PackageReference Include="PeNet" />
                    
Project file
For projects that support Central Package Management (CPM), copy this XML node into the solution Directory.Packages.props file to version the package.
paket add PeNet --version 4.1.4
                    
#r "nuget: PeNet, 4.1.4"
                    
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
#addin nuget:?package=PeNet&version=4.1.4
                    
Install PeNet as a Cake Addin
#tool nuget:?package=PeNet&version=4.1.4
                    
Install PeNet as a Cake Tool

PeNet is a Windows PE (Portable Executable) parser written in C#. It parses all PE
     header structures for x32 and x64.

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 was computed.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 is compatible.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed.  net9.0 was computed.  net9.0-android was computed.  net9.0-browser was computed.  net9.0-ios was computed.  net9.0-maccatalyst was computed.  net9.0-macos was computed.  net9.0-tvos was computed.  net9.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 is compatible. 
.NET Framework net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 is compatible.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (11)

Showing the top 5 NuGet packages that depend on PeNet:

Package Downloads
Microsoft.CST.AttackSurfaceAnalyzer

Microsoft Attack Surface Analyzer is an open source security tool that analyzes the attack surface of a target system and reports on potential security vulnerabilities introduced during the installation of software or system misconfiguration. This package contains the AttackSurfaceAnalyzer library. For the CLI Dotnet Tool, see Microsoft.CST.AttackSurfaceAnalyzer.CLI.

Reloaded.Injector

Advanced DLL Injector capable of injecting x86 DLLs to x86 process from x64 processes.

PeNet.Analyzer

PeNet.Analyzer finds anomalies in Portable Executables (PE) files.

Vezel.Ruptura.Injection

Ruptura is a Windows DLL injection, function interception, and memory manipulation library for .NET. Ruptura injects a bundled native module into the target process, which then locates the .NET runtime in either framework-dependent or self-contained mode and initializes it, after which a user-specified managed assembly is executed - all without the user writing a single line of native code. Additionally, a library facilitating common function hooking and memory manipulation scenarios is available for use by the injected assembly. This package provides the infrastructure to inject the .NET runtime and assemblies into processes.

KarambaCommon

An interactive, parametric Finite Element program for beams and shells.

GitHub repositories (18)

Showing the top 18 popular GitHub repositories that depend on PeNet:

Repository Stars
microsoft/AttackSurfaceAnalyzer
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
NuGetPackageExplorer/NuGetPackageExplorer
Create, update and deploy Nuget Packages with a GUI
goatcorp/Dalamud
FFXIV plugin framework and API
qwqdanchun/DcRat
A simple remote tool in C#.
Flangvik/SharpDllProxy
Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading
xivdev/Penumbra
FINAL FANTASY XIV modding, but actually good this time
knight0x07/ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
redteamsocietegenerale/DLLirant
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
ncatlin/rgat
An instruction trace visualisation tool for dynamic program analysis
microsoft/OSSGadget
Collection of tools for analyzing open source packages.
b4rtik/RedPeanut
RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.
advanced-threat-research/DotDumper
An automatic unpacker and logger for DotNet Framework targeting files
DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
DosX-dev/PE-LiteScan
A simple crossplatform heuristic PE-analyzer
n1xbyte/donutCS
dem sharp donuts
Reloaded-Project/Reloaded.Injector
C# DLL Injection Library capable of injecting x86 DLLs to x86 process from x64 processes.
Grinchiest/SantaRat
A remote access trojan to use against Santa's laptop!
hedge-dev/HedgeModManager
Multiplatform rewrite of Hedge Mod Manager
Version Downloads Last updated
4.1.5 155 4/6/2025
4.1.4 76 4/5/2025
4.1.3 261 4/2/2025
4.1.2 1,419 3/16/2025
4.1.1 11,361 11/24/2024
4.1.0 7,472 9/23/2024
4.0.5 10,034 5/25/2024
4.0.4 12,483 12/22/2023
4.0.3 970 12/6/2023
4.0.2 2,776 9/22/2023
4.0.1 2,612 8/8/2023
3.0.0 8,710 2/1/2023
3.0.0-pre7 256 1/4/2023
3.0.0-pre6 211 12/12/2022
3.0.0-pre5 223 12/6/2022
3.0.0-pre4 341 11/15/2022
3.0.0-pre3 180 11/9/2022
3.0.0-pre2 177 11/9/2022
3.0.0-pre1 220 10/21/2022
2.9.9 8,484 9/26/2022
2.9.9-pre1 259 9/19/2022
2.9.8 3,660 7/8/2022
2.9.8-pre1 241 7/7/2022
2.9.7 35,506 2/17/2022
2.9.6 1,273 2/10/2022
2.9.5 1,296 2/9/2022
2.9.4 1,223 1/30/2022
2.9.3 1,614 1/17/2022
2.9.2 9,769 12/8/2021
2.9.1 4,723 10/13/2021
2.9.0 690 10/6/2021
2.8.1 6,921 8/27/2021
2.8.0 1,031 8/17/2021
2.7.0 510 8/17/2021
2.6.4 18,166 8/4/2021
2.6.4-pre1 314 8/1/2021
2.6.3 19,095 4/27/2021
2.6.2 1,393 3/15/2021
2.6.1 1,818 2/17/2021
2.6.1-pre1 288 2/15/2021
2.6.0 3,466 12/7/2020
2.6.0-alpha1 361 12/5/2020
2.5.1 741 12/1/2020
2.5.1-alpha1 842 11/25/2020
2.5.0 732 11/22/2020
2.4.2 1,577 10/27/2020
2.4.1 774 10/5/2020
2.4.1-alpha2 352 9/21/2020
2.4.0 41,433 6/18/2020
2.4.0-alpha2 444 6/11/2020
2.4.0-alpha1 649 6/10/2020
2.3.1 866 6/11/2020
2.3.0 1,412 6/5/2020
2.3.0-alpha2 405 6/2/2020
2.3.0-alpha1 412 6/2/2020
2.2.7 3,631 5/18/2020
2.2.6 3,312 5/7/2020
2.2.5 864 5/7/2020
2.2.4 876 5/6/2020
2.2.3 876 5/6/2020
2.2.2 678 5/6/2020
2.2.1 781 5/4/2020
2.2.0 861 4/25/2020
2.1.0 840 4/17/2020
2.1.0-alpha1 555 4/12/2020
2.0.0 1,853 3/20/2020
2.0.0-alpha.3 356 3/14/2020
2.0.0-alpha.2 342 3/14/2020
2.0.0-alpha.1 358 3/13/2020
1.6.1 8,421 3/12/2020
1.6.0 899 2/26/2020
1.5.3 4,937 1/7/2020
1.5.2 648 1/7/2020
1.5.1 763 1/7/2020
1.5.0 1,856 12/31/2019
1.4.0 704 12/20/2019
1.3.5 668 12/20/2019
1.3.3 927 12/18/2019
1.3.2 717 12/13/2019
1.3.1 689 12/12/2019
1.3.0 724 12/11/2019
1.3.0-prerelease 472 12/11/2019
1.2.0 727 12/6/2019
1.1.2 737 12/4/2019
1.1.1 20,752 10/17/2019
1.1.0 1,406 10/1/2019
1.0.9 1,228 8/13/2019
1.0.8 1,222 7/17/2019
1.0.7 1,532 6/7/2019
1.0.5 1,062 5/6/2019
1.0.4 1,368 4/18/2019
1.0.3 1,245 4/3/2019
1.0.2 914 4/1/2019
1.0.1 2,856 2/13/2019
1.0.0 828 2/11/2019
0.9.1 6,661 2/8/2019
0.9.0 834 2/8/2019
0.9.0-alpha 629 2/6/2019
0.8.2 2,068 1/14/2019
0.8.1 15,956 12/4/2018
0.8.0 1,633 10/25/2018
0.7.1 959 10/15/2018
0.7.0 40,422 5/24/2018
0.6.8 6,757 2/14/2018
0.6.7 1,815 1/10/2018
0.6.6 1,407 12/22/2017
0.6.5 1,271 12/21/2017
0.6.5-alpha 923 12/20/2017
0.6.4 1,262 12/19/2017
0.6.3 1,563 12/14/2017
0.6.2 1,247 12/12/2017
0.6.1 1,272 12/9/2017
0.6.0 1,358 12/8/2017
0.5.3 9,924 10/3/2017
0.5.2 1,406 9/16/2017
0.5.1 1,364 9/14/2017
0.5.0 2,012 9/4/2017
0.4.6 2,997 11/16/2016
0.4.5 1,335 11/9/2016
0.4.4 1,542 11/8/2016
0.4.3 1,245 10/30/2016
0.4.2 1,165 10/27/2016
0.4.1 1,464 8/14/2016
0.4.0 1,299 6/16/2016
0.3.9 1,237 6/3/2016
0.3.8 1,228 6/2/2016
0.3.7 1,205 5/30/2016
0.3.6 1,207 5/29/2016
0.3.5 1,211 5/25/2016
0.3.4 1,182 5/25/2016
0.3.3 1,236 5/25/2016
0.3.2 1,192 5/25/2016
0.3.1 1,214 5/17/2016
0.3.0 1,285 3/14/2016
0.2.9 1,165 3/7/2016
0.2.8 1,518 2/26/2016
0.2.7 1,224 2/23/2016
0.2.6 1,337 2/22/2016
0.2.5 1,231 2/18/2016
0.2.4 1,309 2/1/2016
0.2.3 1,281 12/14/2015
0.2.2 1,446 12/4/2015
0.2.1 1,441 12/4/2015
0.2.0 1,530 12/4/2015
0.1.9 1,302 12/4/2015
0.1.8 1,455 12/3/2015
0.1.7 1,440 11/27/2015
0.1.6 1,314 9/15/2015
0.1.5 1,270 9/10/2015
0.1.4 1,285 8/28/2015
0.1.3 1,378 7/28/2015
0.1.2 1,314 7/20/2015
0.1.1 1,254 7/12/2015
0.1.0 1,341 7/2/2015
0.0.0 787 12/31/2019