好友
阅读权限 35
听众
最后登录 1970-1-1
风吹屁屁凉
发表于 2024-6-17 17:58
PELS analyzer
PE-LiteScan (or PELS ) is a simple heuristic analyzer for common PE-anomalies, specifically focusing on the detection of packers and protectors. Designed for Windows and Linux.
Download for Windows/Linux x64
Using
Windows
PE-LiteScan-windows.exe "file_to_check.exe"
Linux
./PE-LiteScan-linux "file_to_check.exe"
Detection types
Detection Type
Description
LAST_SECTION_ENTRYPOINT
The entry point is located in the last section of the file.
NO_TEXT_SECTION
The .text
section is missing from the PE file.
STRANGE_OVERLAY
Compressed data found in the overlay section of the file.
HIGH_ENTROPY
High entropy detected, indicating possible packed data.
NET_ANTI_ILDASM
The .NET
binary has the SuppressIldasmAttribute
attribute.
PUSHAL_AT_ENTRY
Strange entry point detected (e.g., starts with PUSHAL
instruction).
CUSTOM_DOS_STUB
Unusual DOS stub found in the PE file.
IMPORT_TABLE_MISSING
The import table is missing from the PE file.
SECTIONS_LIKE_%s
Section names match known packer signatures (e.g., UPX
, VMProtect
).
SECTION_%d_HIGH_ENTROPY
Section contains compressed data.
WEIRD_%d_SECTION_NAME
Section looks very strange.
To do
Powered by PeNet
library.
https://github.com/DosX-dev/PE-LiteScan/releases
免费评分
查看全部评分
发帖前要善用【论坛搜索 】 功能,那里可能会有你要找的答案或者已经有人发布过相同内容了,请勿重复发帖。