PeNet 4.1.5

There is a newer version of this package available.
See the version list below for details.
dotnet add package PeNet --version 4.1.5
                    
NuGet\Install-Package PeNet -Version 4.1.5
                    
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="PeNet" Version="4.1.5" />
                    
For projects that support PackageReference, copy this XML node into the project file to reference the package.
<PackageVersion Include="PeNet" Version="4.1.5" />
                    
Directory.Packages.props
<PackageReference Include="PeNet" />
                    
Project file
For projects that support Central Package Management (CPM), copy this XML node into the solution Directory.Packages.props file to version the package.
paket add PeNet --version 4.1.5
                    
#r "nuget: PeNet, 4.1.5"
                    
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
#addin nuget:?package=PeNet&version=4.1.5
                    
Install PeNet as a Cake Addin
#tool nuget:?package=PeNet&version=4.1.5
                    
Install PeNet as a Cake Tool

PeNet is a Windows PE (Portable Executable) parser written in C#. It parses all PE
     header structures for x32 and x64.

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 was computed.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 is compatible.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed.  net9.0 was computed.  net9.0-android was computed.  net9.0-browser was computed.  net9.0-ios was computed.  net9.0-maccatalyst was computed.  net9.0-macos was computed.  net9.0-tvos was computed.  net9.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 is compatible. 
.NET Framework net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 is compatible.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (11)

Showing the top 5 NuGet packages that depend on PeNet:

Package Downloads
Microsoft.CST.AttackSurfaceAnalyzer

Microsoft Attack Surface Analyzer is an open source security tool that analyzes the attack surface of a target system and reports on potential security vulnerabilities introduced during the installation of software or system misconfiguration. This package contains the AttackSurfaceAnalyzer library. For the CLI Dotnet Tool, see Microsoft.CST.AttackSurfaceAnalyzer.CLI.

Reloaded.Injector

Advanced DLL Injector capable of injecting x86 DLLs to x86 process from x64 processes.

PeNet.Analyzer

PeNet.Analyzer finds anomalies in Portable Executables (PE) files.

Vezel.Ruptura.Injection

Ruptura is a Windows DLL injection, function interception, and memory manipulation library for .NET. Ruptura injects a bundled native module into the target process, which then locates the .NET runtime in either framework-dependent or self-contained mode and initializes it, after which a user-specified managed assembly is executed - all without the user writing a single line of native code. Additionally, a library facilitating common function hooking and memory manipulation scenarios is available for use by the injected assembly. This package provides the infrastructure to inject the .NET runtime and assemblies into processes.

KarambaCommon

An interactive, parametric Finite Element program for beams and shells.

GitHub repositories (18)

Showing the top 18 popular GitHub repositories that depend on PeNet:

Repository Stars
microsoft/AttackSurfaceAnalyzer
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
NuGetPackageExplorer/NuGetPackageExplorer
Create, update and deploy Nuget Packages with a GUI
goatcorp/Dalamud
FFXIV plugin framework and API
qwqdanchun/DcRat
A simple remote tool in C#.
Flangvik/SharpDllProxy
Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading
xivdev/Penumbra
FINAL FANTASY XIV modding, but actually good this time
knight0x07/ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
redteamsocietegenerale/DLLirant
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
ncatlin/rgat
An instruction trace visualisation tool for dynamic program analysis
microsoft/OSSGadget
Collection of tools for analyzing open source packages.
b4rtik/RedPeanut
RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.
DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
advanced-threat-research/DotDumper
An automatic unpacker and logger for DotNet Framework targeting files
DosX-dev/PE-LiteScan
A simple crossplatform heuristic PE-analyzer
n1xbyte/donutCS
dem sharp donuts
Reloaded-Project/Reloaded.Injector
C# DLL Injection Library capable of injecting x86 DLLs to x86 process from x64 processes.
Grinchiest/SantaRat
A remote access trojan to use against Santa's laptop!
hedge-dev/HedgeModManager
Multiplatform rewrite of Hedge Mod Manager
Version Downloads Last updated
5.1.0 409 4/16/2025
5.0.0 367 4/12/2025
4.1.5 575 4/6/2025
4.1.4 121 4/5/2025
4.1.3 369 4/2/2025
4.1.2 1,975 3/16/2025
4.1.1 12,826 11/24/2024
4.1.0 7,699 9/23/2024
4.0.5 10,222 5/25/2024
4.0.4 12,591 12/22/2023
4.0.3 973 12/6/2023
4.0.2 2,784 9/22/2023
4.0.1 2,638 8/8/2023
3.0.0 8,743 2/1/2023
3.0.0-pre7 258 1/4/2023
3.0.0-pre6 213 12/12/2022
3.0.0-pre5 225 12/6/2022
3.0.0-pre4 349 11/15/2022
3.0.0-pre3 181 11/9/2022
3.0.0-pre2 179 11/9/2022
3.0.0-pre1 222 10/21/2022
2.9.9 8,514 9/26/2022
2.9.9-pre1 261 9/19/2022
2.9.8 3,662 7/8/2022
2.9.8-pre1 242 7/7/2022
2.9.7 35,775 2/17/2022
2.9.6 1,280 2/10/2022
2.9.5 1,298 2/9/2022
2.9.4 1,232 1/30/2022
2.9.3 1,616 1/17/2022
2.9.2 9,786 12/8/2021
2.9.1 4,748 10/13/2021
2.9.0 695 10/6/2021
2.8.1 6,946 8/27/2021
2.8.0 1,035 8/17/2021
2.7.0 513 8/17/2021
2.6.4 18,417 8/4/2021
2.6.4-pre1 317 8/1/2021
2.6.3 19,184 4/27/2021
2.6.2 1,397 3/15/2021
2.6.1 1,824 2/17/2021
2.6.1-pre1 293 2/15/2021
2.6.0 3,482 12/7/2020
2.6.0-alpha1 366 12/5/2020
2.5.1 745 12/1/2020
2.5.1-alpha1 847 11/25/2020
2.5.0 738 11/22/2020
2.4.2 1,582 10/27/2020
2.4.1 779 10/5/2020
2.4.1-alpha2 357 9/21/2020
2.4.0 41,862 6/18/2020
2.4.0-alpha2 448 6/11/2020
2.4.0-alpha1 654 6/10/2020
2.3.1 871 6/11/2020
2.3.0 1,418 6/5/2020
2.3.0-alpha2 409 6/2/2020
2.3.0-alpha1 417 6/2/2020
2.2.7 3,636 5/18/2020
2.2.6 3,317 5/7/2020
2.2.5 870 5/7/2020
2.2.4 881 5/6/2020
2.2.3 881 5/6/2020
2.2.2 683 5/6/2020
2.2.1 786 5/4/2020
2.2.0 865 4/25/2020
2.1.0 850 4/17/2020
2.1.0-alpha1 560 4/12/2020
2.0.0 1,860 3/20/2020
2.0.0-alpha.3 361 3/14/2020
2.0.0-alpha.2 346 3/14/2020
2.0.0-alpha.1 365 3/13/2020
1.6.1 8,430 3/12/2020
1.6.0 903 2/26/2020
1.5.3 4,957 1/7/2020
1.5.2 653 1/7/2020
1.5.1 767 1/7/2020
1.5.0 1,861 12/31/2019
1.4.0 709 12/20/2019
1.3.5 673 12/20/2019
1.3.3 932 12/18/2019
1.3.2 721 12/13/2019
1.3.1 694 12/12/2019
1.3.0 728 12/11/2019
1.3.0-prerelease 477 12/11/2019
1.2.0 734 12/6/2019
1.1.2 742 12/4/2019
1.1.1 20,790 10/17/2019
1.1.0 1,411 10/1/2019
1.0.9 1,232 8/13/2019
1.0.8 1,226 7/17/2019
1.0.7 1,538 6/7/2019
1.0.5 1,067 5/6/2019
1.0.4 1,374 4/18/2019
1.0.3 1,253 4/3/2019
1.0.2 920 4/1/2019
1.0.1 2,861 2/13/2019
1.0.0 834 2/11/2019
0.9.1 6,670 2/8/2019
0.9.0 840 2/8/2019
0.9.0-alpha 635 2/6/2019
0.8.2 2,074 1/14/2019
0.8.1 15,996 12/4/2018
0.8.0 1,638 10/25/2018
0.7.1 964 10/15/2018
0.7.0 40,463 5/24/2018
0.6.8 6,774 2/14/2018
0.6.7 1,828 1/10/2018
0.6.6 1,419 12/22/2017
0.6.5 1,284 12/21/2017
0.6.5-alpha 931 12/20/2017
0.6.4 1,275 12/19/2017
0.6.3 1,572 12/14/2017
0.6.2 1,260 12/12/2017
0.6.1 1,285 12/9/2017
0.6.0 1,371 12/8/2017
0.5.3 10,250 10/3/2017
0.5.2 1,415 9/16/2017
0.5.1 1,372 9/14/2017
0.5.0 2,024 9/4/2017
0.4.6 3,007 11/16/2016
0.4.5 1,343 11/9/2016
0.4.4 1,550 11/8/2016
0.4.3 1,253 10/30/2016
0.4.2 1,173 10/27/2016
0.4.1 1,472 8/14/2016
0.4.0 1,307 6/16/2016
0.3.9 1,244 6/3/2016
0.3.8 1,235 6/2/2016
0.3.7 1,212 5/30/2016
0.3.6 1,215 5/29/2016
0.3.5 1,219 5/25/2016
0.3.4 1,189 5/25/2016
0.3.3 1,244 5/25/2016
0.3.2 1,199 5/25/2016
0.3.1 1,222 5/17/2016
0.3.0 1,296 3/14/2016
0.2.9 1,173 3/7/2016
0.2.8 1,525 2/26/2016
0.2.7 1,232 2/23/2016
0.2.6 1,345 2/22/2016
0.2.5 1,239 2/18/2016
0.2.4 1,317 2/1/2016
0.2.3 1,288 12/14/2015
0.2.2 1,453 12/4/2015
0.2.1 1,448 12/4/2015
0.2.0 1,538 12/4/2015
0.1.9 1,310 12/4/2015
0.1.8 1,462 12/3/2015
0.1.7 1,447 11/27/2015
0.1.6 1,322 9/15/2015
0.1.5 1,278 9/10/2015
0.1.4 1,292 8/28/2015
0.1.3 1,385 7/28/2015
0.1.2 1,321 7/20/2015
0.1.1 1,262 7/12/2015
0.1.0 1,348 7/2/2015
0.0.0 792 12/31/2019