pe-analyzer
There are 30 repositories under pe-analyzer topic.
hasherezade/pe-sieve
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
hasherezade/pe-bear
Portable Executable reversing tool with a friendly GUI
hasherezade/pe-bear-releases
PE-bear (builds only)
HoShiMin/formatPE
A bunch of parsers for PE and PDB formats in C++
sevaa/dwex
DWARF Explorer - a GUI utility for navigating the DWARF debug information
jovibor/libpe
Library for parsing internal structures of PE32/PE32+ binary files.
jnastarot/furikuri
too busy for that all, furikuri is framework for code protection
jovibor/Pepper
PE32 (x86) and PE32+ (x64) binaries analysis tool, resources viewer/extractor.
jnastarot/enma_pe
Cross-platform library for parsing and building PE\PE+ formats
password123456/CertVerify
A scanner that files with compromised or untrusted code signing certificates written in python.
adamhlt/PE-Explorer
PE Explorer in C++ (x86 / x64) - PE file parser, retrieve exports and imports
jnastarot/shibari
Library for linking multiple PE\PE + files to one
ignacioj/WhacAMole
Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and environment variables. Dumps, detects and dissasemble hooks, shellcode, memory regions, modules and processes.
nurupo/mingw-ldd
Lists dependencies of a PE (exe/dll) file
r3yl4h/PE-x86-Parser
this is a small pe64 file analyzer in c++ with winapi, I didn't do it in the best way but hey, it's a small project like that that I thought was nice to do, the program can work in it calling with arguments or executing it as such.
deadbits/pe-static
Static file analysis for PE files
Alex4386/pe-parser
PE/MZ Header Parser :: A crossplatform Windows PE/MS-DOS MZ Header Parser : Powered by @pay1oad-repo
BGPavelAng/MasamunpeX
MasamunpeX Linux
jmcph4/butyl
Binary executable tool
ramirak/Aurora-AI
Artificial intelligence malware identifier based on thousands of malware samples
BGPavelAng/MasamunPE
MasamunPE Windows
CloneLTaps/ProcessExplorer
Process Explorer is a tool that lets you inspect PE internals. It also has a built in hex editor that allows you to modify any file before saving it again.
RIscRIpt/pecoff
Go package for accessing PE/COFF files.
mauricelambert/ProgramExecutableAnalyzer
This script analyzes MZ-PE (MS-DOS) executable file
rishank-shah/Static-Malware-Analysis
Python program to automate simple tasks related to static malware analysis.
UserExistsError/resource-explorer
View and extract Portable Executable (PE) resources
haja-fgabriel/pe_parser
Portable Executable parser for Windows. Supports both 32-bit and 64-bit executables and dynamic-link libraries
marufmurtuza/PESA
A static PE Analyzer
hal0taso/PEanalyzer
PE header analyzer