POEX is a library to access, load and manipulate PE (Portable Executable) files.
-
Updated
Apr 1, 2023 - C++
POEX is a library to access, load and manipulate PE (Portable Executable) files.
Crystal Lang library for parsing of x64/x86 Windows PE files.
x86-64 executable creation example
A lib to distinguish a shared library from an executable. Mostly for ELF, but some rudimentary (file name extension-based) support of windows was added.
Implementation of the packing detection heuristic from the paper "Packed PE File Detection for Malware Forensics" of Han et al.
PE file parser developed on the course "Reverse Engineering and Malware Analysis" at FER.
Inject a New Section to the pe-executable file
A Malware Prediction model that predicted if the PE format file is malicious or legitimate.
Machine Learning Malware Detector
Binary executable tool
The reverse-engineering tool for Windows executables
GetTyp/GetType/GT2 - legacy file format detector
A Virus to encourage veganism and deter against eating meat.
Heuristically recover relocations and imports from module memory dumps
Provides parsing and generating Portable Executable binaries
Add a description, image, and links to the pe-format topic page so that developers can more easily learn about it.
To associate your repository with the pe-format topic, visit your repo's landing page and select "manage topics."