readpe (formerly known as pev) is a multiplatform toolkit to work with PE (Portable Executable) binaries. Its main goal is to provide feature-rich tools for properly analyze binaries with a strong focus on suspicious ones.

Features

  • Based on own PE library, called libpe
  • Support for PE32 and PE32+ (64-bit) files
  • Formatted output in text, CSV, HTML, and XML
  • pesec: check security features in PE files, extract certificates, and more
  • readpe: parse PE headers, sections, imports and exports
  • pescan: detect TLS callback functions, DOS stub modification, suspicious sections and more
  • pedis: disassembly a PE file section or function with support for Intel and AT&T syntax
  • Include tools to convert RVA from file offset and vice-versa
  • pehash: calculate PE file hashes including imphash and ssdeep
  • pepack: detect whether an executable is packed or not
  • pestr: search for hardcoded Unicode and ASCII strings simultaneously in PE files
  • peres: show and extract PE file resources

Project Samples

Project Activity

See All Activity >

License

GNU General Public License version 2.0 (GPLv2)

Follow readpe

readpe Web Site

Other Useful Business Software
Cyber Risk Assessment and Management Platform Icon
Cyber Risk Assessment and Management Platform

ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
0
0
1
0
0
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 3 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 3 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 3 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 3 / 5

User Reviews

  • Just OK.
Read more reviews >

Additional Project Details

Intended Audience

Developers, Auditors, Security Professionals

User Interface

Command-line

Programming Language

C

Related Categories

C Security Software, C Software Development Software, C Anti-Malware Software

Registered

2011-03-25