Package: wnpp Severity: wishlist Owner: David da Silva Polverari <david.polver...@gmail.com> X-Debbugs-Cc: debian-devel@lists.debian.org
* Package name : readpe Version : 0.82 Upstream Contact: https://github.com/mentebinaria/readpe/issues * URL : https://github.com/mentebinaria/readpe * License : GPL-2+ with OpenSSL Exception Programming Lang: C Description : command-line tools to manipulate Windows PE files readpe is a toolkit designed to analyze Microsoft Windows PE (Portable Executable) binary files. Its tools can parse and compare PE32/PE32+ executable files (EXE, DLL, OCX, etc), and analyze them in search of suspicious characteristics. It can be used to get information from those executable files, such as headers, sections, resources and more. It also provides tools to disassemble PE files and determine their security mitigations. It is useful for application security research, digital forensics and incident response, and malware analysis. It is similar to elftools, only designed for PE files. It has more features than other more specific PE tools, such as icoextract or ntldd. This package provides the ofs2rva, pedis, pehash, peldd, pepack, peres, pescan, pesec, pestr, readpe and rva2ofs commands. This package is a newer version of the pev package (already maintained in Debian by me), as upstream renamed it to readpe. I plan to maintain it inside the pkg-security team umbrella.