-
Updated
May 15, 2016 - Assembly
pe-analyzer
Here are 31 public repositories matching this topic...
Portable Executable parser for Windows. Supports both 32-bit and 64-bit executables and dynamic-link libraries
-
Updated
Apr 8, 2019 - C
too busy for that all, furikuri is framework for code protection
-
Updated
Nov 2, 2019 - C++
Binary executable tool
-
Updated
Nov 8, 2019 - Rust
Go package for accessing PE/COFF files.
-
Updated
Sep 23, 2020 - Go
Static file analysis for PE files
-
Updated
Dec 4, 2020 - Python
Freeware Reversing Tool
-
Updated
Jul 6, 2022
Cross-platform library for parsing and building PE\PE+ formats
-
Updated
Jul 31, 2022 - C++
Python program to automate simple tasks related to static malware analysis.
-
Updated
Oct 6, 2022 - Python
Artificial intelligence malware identifier based on thousands of malware samples
-
Updated
Jan 29, 2023 - Python
A static PE Analyzer
-
Updated
Apr 28, 2023
PE/MZ Header Parser :: A crossplatform Windows PE/MS-DOS MZ Header Parser : Powered by @Pay1oad-repo
-
Updated
Jun 20, 2023 - C++
A scanner that files with compromised or untrusted code signing certificates written in python.
-
Updated
Sep 6, 2023 - Python
Process Explorer is a tool that lets you inspect PE internals. It also has a built in hex editor that allows you to modify any file before saving it again.
-
Updated
Sep 25, 2023 - C#
PE Explorer in C++ (x86 / x64) - PE file parser, retrieve exports and imports
-
Updated
Feb 17, 2024 - C++
Version Masamunpe for Linux
-
Updated
Feb 24, 2024 - C
Library for linking multiple PE\PE + files to one
-
Updated
Mar 16, 2024 - C++
Improve this page
Add a description, image, and links to the pe-analyzer topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pe-analyzer topic, visit your repo's landing page and select "manage topics."