A Python tool for creating adversarial PE files by applying mutations driven by camera-based entropy, with a feedback loop for evasion and steganographic logging.
-
Updated
Oct 25, 2025 - Python
A Python tool for creating adversarial PE files by applying mutations driven by camera-based entropy, with a feedback loop for evasion and steganographic logging.
Warm greetings to ESET! x86-64 executable creation example
Implementation of the packing detection heuristic from the paper "Packed PE File Detection for Malware Forensics" of Han et al.
This project is a C++ application designed to search for a specified keyword within the sections of Portable Executable (PE) files located in a given directory.
Standard and DLL Manual Mapping
Packing detection tool for PE files
Dataset of packed PE samples
Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes
Python implementation of the Packed Executable iDentifier (PEiD)
Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.
DWARF Explorer - a GUI utility for navigating the DWARF debug information
Add a description, image, and links to the pe-files topic page so that developers can more easily learn about it.
To associate your repository with the pe-files topic, visit your repo's landing page and select "manage topics."