Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
-
Updated
Oct 31, 2025 - C++
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
The BEST DLL Injector Library.
Portable Executable reversing tool with a friendly GUI
A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl
Principled, lightweight C/C++ PE parser
PE file viewer/editor for Windows, Linux and MacOS.
Python AV Evasion Tools
Persistent IAT hooking application - based on bearparser
A ⚡ lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
A bunch of parsers for PE and PDB formats in C++
PE32 (x86) and PE32+ (x64) binaries analysis tool, resources viewer/extractor.
Library for parsing internal structures of PE32/PE32+ binary files.
flat assembler g - adaptable assembly engine
Cross-platform library for parsing and building PE\PE+ formats
A Windows PE loader / manual mapper for executables (x86 and x64) with full TLS (Thread Local Storage) support.
A neural approach to malware detection in portable executables
Python implementation of the Packed Executable iDentifier (PEiD)
Small visualizator for PE files
Add a description, image, and links to the pe-format topic page so that developers can more easily learn about it.
To associate your repository with the pe-format topic, visit your repo's landing page and select "manage topics."