[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1040810: ITP: readpe -- command-line tools to manipulate Windows PE files



Package: wnpp
Severity: wishlist
Owner: David da Silva Polverari <david.polverari@gmail.com>
X-Debbugs-Cc: debian-devel@lists.debian.org

* Package name    : readpe
  Version         : 0.82
  Upstream Contact: https://github.com/mentebinaria/readpe/issues
* URL             : https://github.com/mentebinaria/readpe
* License         : GPL-2+ with OpenSSL Exception
  Programming Lang: C
  Description     : command-line tools to manipulate Windows PE files

readpe is a toolkit designed to analyze Microsoft Windows PE (Portable
Executable) binary files.  Its tools can parse and compare PE32/PE32+
executable files (EXE, DLL, OCX, etc), and analyze them in search of
suspicious characteristics.

It can be used to get information from those executable files, such as
headers, sections, resources and more. It also provides tools to disassemble
PE files and determine their security mitigations.  It is useful for
application security research, digital forensics and incident response, and
malware analysis.

It is similar to elftools, only designed for PE files. It has more features
than other more specific PE tools, such as icoextract or ntldd.

This package provides the ofs2rva, pedis, pehash, peldd, pepack, peres,
pescan, pesec, pestr, readpe and rva2ofs commands.

This package is a newer version of the pev package (already maintained
in Debian by me), as upstream renamed it to readpe. I plan to maintain
it inside the pkg-security team umbrella.


Reply to: