Python implementation of the Packed Executable iDentifier (PEiD)
-
Updated
May 15, 2024 - Python
Python implementation of the Packed Executable iDentifier (PEiD)
A neural approach to malware detection in portable executables
Small visualizator for PE files
Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detection
Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes
Dataset of packed PE samples
RE scripts, snippets (IDA, lief, gdb, etc.)
Packing detection tool for PE files
Machine Learning Malware Detector
Implementation of the packing detection heuristic from the paper "Packed PE File Detection for Malware Forensics" of Han et al.
Inject a New Section to the pe-executable file
A Malware Prediction model that predicted if the PE format file is malicious or legitimate.
PE file parser developed on the course "Reverse Engineering and Malware Analysis" at FER.
Add a description, image, and links to the pe-format topic page so that developers can more easily learn about it.
To associate your repository with the pe-format topic, visit your repo's landing page and select "manage topics."