MiTeC EXE Explorer reads and displays executable file properties and structure. It is compatible with PE32 (Portable Executable), PE32+ (64bit), NE (Windows 3.x New Executable) and VxD (Windows 9x Virtual Device Driver) file types, as well as .NET executables.
The program identify compiler and packer/protector, enumerates introduced classes, used units and forms for files compiled by Borland compilers. It contains powerfull Resource Viewer that is able to abalyze and display all basic resouce types and some extra ones as JPEG, PNG, GIF, AVI, REGISTRY and Type Library viewer that enumerates all objects and creates import interface unit in Object Pascal language. Every type of resource can be saved to file.
Program data can be output to a text report.
Category: | |
Runs on: | WinXP / Vista / Win7 / Win8 / Win10 |
Writes settings to: | If "File | Persistent Layout" option is enabled, an INI file will be written to '%APPDATA%\MITEC\EXE Explorer'. Also writes to the Registry when "File | Shell Integration" is enabled (saved to 'HKLM\SOFTWARE\Classes\*\shell\EXE Explorer'). |
Stealth: ? | Yes. But only without persistent layout or shell integration; otherwise see "Writes settings to" above. |
Unicode support: | Yes |
License: | Free for personal use |
How to extract: | Download the ZIP package and extract to a folder of your choice. Launch EXE.exe or EXE64.exe (for 64-bit OS). |
Similar/alternative apps: | PPEE, PEAnatomist, pestudio |
What's new? | See: https://mitec.cz/exe.html#VersionHistory |
Latest comments |
CornHolio the Gringo
on 2018-02-06 16:27
Add comment
1›
All MiTeC software that I use, writes to registry. |
Detect It Easy (DIE) is a packer identifier in order to help define a file type. Comes in handy to analyze a file, determine its type and packer.
Category: | |
Runs on: | WinXP / Vista / Win7 / Win8 / Win10 |
Writes settings to: | Application folder |
Stealth: ? | No. HKCU\Software\QtProject |
Unicode support: | Yes |
License: | MIT License |
How to extract: | Download the "portable" ZIP package and extract to a folder of your choice. Launch die.exe. |
What's new? | See: https://github.com/horsicq/Detect-It-Easy/blob/master/changelog.txt |
Latest comments |
juverax
on 2018-08-04 09:27
Add comment
2›
Detect It Easyv2.00 |
pestudio shows details about applications and other system files (.exe, .dll, .cpl, .ocx, .ax, .sys etc.) without starting them including:
Category: | |
Runs on: | Win2K / WinXP / Vista / Win7 / Win8 / Win10 |
Writes settings to: | Application folder |
Stealth: ? | Yes |
Unicode support: | Yes |
License: | Free for personal use/Liteware |
How to extract: | Download the ZIP package and extract to a folder of your choice. Delete AddToShell.reg and RemoveFromShell.reg. Launch pestudio.exe. |
Similar/alternative apps: | PPEE, PE Anatomist |
What's new? | See: https://www.winitor.com/tools/pestudio/changes.log |
Latest comments |
__philippe
on 2017-11-26 21:39
All righty,... next time round,
Special
on 2019-09-14 18:16
See all
86›
Looks like with 8.98 they've removed even more features from the previous 9.87 free version (detect well-known whitelisted libraries/blacklisted resources), funny they don't mention that in the changelog. |
PEAnatomist shows almost all known data structures inside a PE file and makes some analytics.
Current version provides an entropy histogram possibly handy for cursory PE forensics
Category: | |
Runs on: | WinXP / Vista / Win7 / Win8 / Win10 |
Writes settings to: | Application folder |
Stealth: ? | Yes |
Unicode support: | Yes |
License: | MIT License |
How to extract: | Download the ZIP package and extract to a folder of your choice. Launch PEAnatomist.exe. |
Similar/alternative apps: | PPEE, MiTeC EXE Explorer, pestudio |
What's new? | See: https://rammerlabs.alidml.ru/changelog-eng.html |
Latest comments |
__philippe
on 2019-12-28 12:07
PE Anatomist changelog history:
__philippe
on 2021-11-05 10:42
Add comment
2›
PEanatomist notably includes (since v0.2.4) a colorful byte-level entropy(*) histogram of the file under analysis, possibly handy for inquiring minds dabbling in PE forensics ? |
PPEE (Professional PE file Explorer) allows analysis of malformed and crafted PE files, making it handy for reverse-engineering, malware researchers and more. The program includes PE Export, Import, Resource, Exception, Certificate (relies on Windows API), Base Relocation, Debug, TLS, Load Config, Bound Import, IAT, Delay Import and CLR.
The program includes a HEX editor and supports Virustotal and OPSWAT's Metadefender query reports.
Category: | |
Runs on: | WinXP / Vista / Win7 / Win8 / Win10 / Wine |
Writes settings to: | Application folder |
Unicode support: | Yes |
License: | Freeware |
How to extract: | Download the ZIP package and extract to a folder of your choice. Delete Plugin folder. Launch PPEE.exe. |
Similar/alternative apps: | pestudio, MiTeC EXE Explorer |
What's new? |
|
Latest comments |
smaragdus
on 2018-04-12 09:27
@doctor__philippe
__philippe
on 2018-04-12 17:50
See all
16›
Now that you mention it, I have been known to cure images hosting service broken links...;-) |