Library for plotting executable samples supporting multiple formats
-
Updated
Nov 23, 2025 - Python
Library for plotting executable samples supporting multiple formats
PE file parser developed on the course "Reverse Engineering and Malware Analysis" at FER.
Implementation of the packing detection heuristic from the paper "Packed PE File Detection for Malware Forensics" of Han et al.
Inject a New Section to the pe-executable file
A Malware Prediction model that predicted if the PE format file is malicious or legitimate.
Machine Learning Malware Detector
scripts, snippets etc.
Packing detection tool for PE files
Dataset of packed PE samples
Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes
Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detection
Small visualizator for PE files
A neural approach to malware detection in portable executables
Python implementation of the Packed Executable iDentifier (PEiD)
Python AV Evasion Tools
Add a description, image, and links to the pe-format topic page so that developers can more easily learn about it.
To associate your repository with the pe-format topic, visit your repo's landing page and select "manage topics."