Crystal Lang library for parsing of x64/x86 Windows PE files.
-
Updated
Feb 19, 2024 - Crystal
Crystal Lang library for parsing of x64/x86 Windows PE files.
x86-64 executable creation example
A lib to distinguish a shared library from an executable. Mostly for ELF, but some rudimentary (file name extension-based) support of windows was added.
Implementation of the packing detection heuristic from the paper "Packed PE File Detection for Malware Forensics" of Han et al.
Inject a New Section to the pe-executable file
POEX is a library to access, load and manipulate PE (Portable Executable) files.
PE file parser developed on the course "Reverse Engineering and Malware Analysis" at FER.
A Malware Prediction model that predicted if the PE format file is malicious or legitimate.
Machine Learning Malware Detector
Binary executable tool
The reverse-engineering tool for Windows executables
GetTyp/GetType/GT2 - legacy file format detector
A Virus to encourage veganism and deter against eating meat.
Heuristically recover relocations and imports from module memory dumps
Provides parsing and generating Portable Executable binaries
Add a description, image, and links to the pe-format topic page so that developers can more easily learn about it.
To associate your repository with the pe-format topic, visit your repo's landing page and select "manage topics."