readpe is a command-line tool designed for analyzing Portable Executable (PE) files, the standard executable format used in Windows operating systems. The tool provides comprehensive examination capabilities for PE file structures, allowing users to inspect various components including file headers, section information, import and export tables, and other metadata contained within executable binaries. readpe offers detailed insights into the internal structure of Windows executables, making it useful for reverse engineering, malware analysis, and general binary inspection tasks. The tool can extract and display information about PE file characteristics, compilation details, and embedded resources. The project has transitioned to new maintainership under @mentebinaria/readpe, ensuring ongoing development and community support for users requiring PE file analysis capabilities.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
Code to prevent a managed .NET debugger/profiler from working.
A program to manage yara ruleset in a database with support for different databases and configuration options.
A sandbox for quickly sandboxing known or unknown families of Android Malware
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
A collaborative malware analysis framework with various features for automated analysis tasks.