pev
pe
pev | pe | |
---|---|---|
5 | 4 | |
514 | 286 | |
- | 4.5% | |
4.7 | 5.8 | |
over 2 years ago | about 2 months ago | |
C | Go | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pev
-
Get "File Version" from an exe file stored on Linux
https://github.com/merces/pev/wiki ?
-
pev, a multiplatform PE analysis toolkit is looking for a new maintainer
I had never heard of this and prefer not reading through the code on mobile, so I went to the homepage to get a better idea of what it is. The video introduction was helpful, but it also raised two questions for me.
-
Add pev support?
pev is a mighty PE file analysis toolkit, which allows to analyse and/or extract windows exe files easily.
pe
What are some alternatives?
radare2 - UNIX-like reverse engineering framework and command-line toolset [Moved to: https://github.com/radareorg/radare2]
LIEF - LIEF - Library to Instrument Executable Formats
dll_to_exe - Converts a DLL into EXE
VXUG-Papers - Research code & papers from members of vx-underground.
peid - Python implementation of the Packed Executable iDentifier (PEiD)
neurax - A framework for constructing self-spreading binaries
emp3r0r - Linux/Windows post-exploitation framework made by linux user
blackCatConf - Configuration Extractor for BlackCat Ransomware
REconfig-linux - Configuration Extractor for the Linux variant of REvil Ransomware
MicroSCOPE - Static analysis tool that can identify potential ransomware on PE or ELF files based on heuristics
amber - Reflective PE packer.