PE file viewer/editor for Windows, Linux and MacOS.
-
Updated
May 22, 2024 - C++
PE file viewer/editor for Windows, Linux and MacOS.
Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detection
flat assembler g - adaptable assembly engine
A ⚡ lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
Python implementation of the Packed Executable iDentifier (PEiD)
A bunch of parsers for PE and PDB formats in C++
Library for parsing internal structures of PE32/PE32+ binary files.
PE Parsing, but blazing fast
The BEST DLL Injector Library.
Portable Executable reversing tool with a friendly GUI
Provides parsing and generating Portable Executable binaries
Dataset of packed PE samples
A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl
Principled, lightweight C/C++ PE parser
PE32 (x86) and PE32+ (x64) binaries analysis tool, resources viewer/extractor.
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
PE file parser developed on the course "Reverse Engineering and Malware Analysis" at FER.
Add a description, image, and links to the pe-format topic page so that developers can more easily learn about it.
To associate your repository with the pe-format topic, visit your repo's landing page and select "manage topics."