Explorer Suite, created by Erik Pistelli, is a freeware suite of tools including a PE editor called CFF Explorer and a process viewer, with full support for PE32/64, special fields description and modification, utilities, rebuilder, hex editor, import adder, signature scanner, signature manager, extension support, scripting, disassembler, dependency walker, and more. It is the first PE editor with support for .NET internal structures and a Resource Editor capable of handling .NET manifest resources, available for x86 and x64.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.
A collection of resources for beginners to learn assembly language.
A simple XSS scanner tool for identifying Cross-Site Scripting vulnerabilities
FLARE-VM is a collection of software installation scripts for Windows systems designed for setting up and maintaining a reverse engineering environment on a virtual machine.
Powerful debugging tool with extensive features and extensions for memory dump analysis and crash dump analysis.
Command line tool for testing CRLF injection on a list of domains.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.