This is a Python script that converts shellcode into a PE32 or PE32+ file. It takes a shellcode file path and an architecture (win32 or win64) as input. The script creates a PE file with the provided shellcode. The script uses pre-defined stubs for PE32 and PE32+ files, and appends the shellcode to the stub. The resulting PE file is written to a new file with a .pe.bin extension.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A program to manage yara ruleset in a database with support for different databases and configuration options.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.