Reverse Dependencies of pefile
The following projects have a declared dependency on pefile:
- 111752 — malware analysis
- abaci-users — A reusable Django users app
- abi3audit — Scans Python wheels for abi3 violations and inconsistencies
- AFS-file-validator — 测试AFS文件签名
- agstoolbox — Utility to help manage Adventure Game Studio Projects and Editors.
- ak-frame-extractor — Python-based GUI tool to extract frames from video files produced with Azure Kinect cameras.
- aspectreat — This is a project template.
- assemblyline-service-utilities — Assemblyline 4 - Service Utilities
- assemblyline-v4-service — Assemblyline 4 - Service base
- atomicshop — Atomic functions and classes to make developer life easier
- autoit-ripper — Extract AutoIt scripts embedded in PE binaries
- AutoReg-MrPaC6689 — AUTOREG - Operação automatizada de Sistemas - SISREG & G-HOSP
- avproxyrotate — Rotates Avast proxy servers
- BackgroundVellore — Predict the Genre for each 10-second interval of the video.
- badtooth — A memory hacking package for windows games.
- baotool — BaoTool (宝图), 个人积累的 python 工具库
- barf — A multiplatform open source Binary Analysis and Reverse engineering Framework
- besta-tools — Tools for working with Besta data formats
- binary-refinery — A toolkit to transform and refine (mostly) binary data.
- bindepend — Binary depedency analysis
- biosutilities — Various BIOS Utilities for Modding/Research
- CAPE-parsers — CAPE: Malware Configuration Extraction
- CAPEsolo — Standalone CAPEMON
- carve-exe — Carve Exe is a simple best effort tool to carve PE and ELF files from arbitrary, binary files (e.g. memory dumps and executables).
- ccfreeze — create standalone executables from python scripts
- cle — CLE Loads Everything (at least, many binary formats!) and provides a pythonic interface to analyze what they are and what they would look like in memory.
- cluseek — A GUI application for finding and categorizing gene clusters found in the NCBI GenBank genomic database.
- code-challenge — Coding interview CLI that directs the user to answer timed coding interview questions in Python, JS, or C++
- collect-bin-deps — A tool to collect binary dependencies
- consolidatewheels — Consolidates the shared object dependencies across multiple wheels
- cs489-pyinstaller-testable-1 — PyInstaller bundles a Python application and all its dependencies into a single package.
- Cuckoo3-processing — Cuckoo data processing helpers and modules
- custom-fork-pyinstaller-1 — PyInstaller bundles a Python application and all its dependencies into a single package.
- DalineUnit — daline unit generator and runner
- dan-build — Python-based build system.
- dbf2sql — Convert DBF files to SQL tables
- debloat — Debloat is an tool to remove excess garbage from bloated executables.
- decore-base — decore Base is an out-of-the-box "Python to Vue.js" data application dashboard that helps you go from idea to view in a few simple steps. It is aimed at those who want to focus on the results of their algorithms , do scientific work, or perform teaching or learning functions.
- defender2yara — Convert Microsoft Defender Antivirus Signatures(VDM) to YARA rules.
- delvewheel — Self-contained wheels for Windows
- detectiq — A detection engineering workbench with LLM capabilities
- dll-diagnostics — Tools for diagnosing DLL dependency loading issues
- dmtoolbox-win — Uma extensão do dmtoolbox focada em funcionalidades específicas do Windows, incluindo manipulação de registros, criação de executáveis e gerenciamento de arquivos e configurações avançadas do sistema.
- dnfile — Parse .NET executable files.
- dotnetfile — Library to parse the CLR header of .NET assemblies
- doublehelix — Genomic data manipulation tool
- Dragodis — A universal interface for running scripts under multiple disassemblers.
- drakpdb — Helper library to generate DRAKVUF profiles.
- dumpscan — Scanning memory dumps for secrets using volatility and yara
- edk2-pytool-extensions — Python tools supporting UEFI EDK2 firmware development
- elib — no summary
- EPAB — Etcher's Python Application Builder
- esst — no summary
- evbunpack — Enigma Virtual Box Unpacker / 解包工具
- exespy — Cross-platform PE viewer
- extract-icon — Extract Icon from PE Executable File
- Farsa — no summary
- fdr-beta — Sample fdr lib
- fdr-dev-1.0 — Sample fdr lib
- fdr-dev-1.1 — Sample fdr lib
- fdr-dev-1.2 — Sample fdr lib
- fdr-test — Sample fdr lib
- fdr-test2 — Sample fdr lib
- fdr-v1 — Sample fdr lib
- fdr-v2 — Sample fdr lib
- fdr-v3 — Sample fdr lib
- fdr-v4 — Sample fdr lib
- fdr-v5 — Sample fdr lib
- fdr-v6 — Sample fdr lib
- finalcif — CIF file editor
- flare-capa — The FLARE team's open-source tool to identify capabilities in executable files.
- FlareSolverr — Proxy server to bypass Cloudflare protection
- fluid-sbom — Fluid Attacks SBOM Library
- fuel-track — Lleva seguimiento del consumo de combustible
- gadgetfinder — A tool with interactive shell for finding gadgets in executable files
- generoo — Generate code without writing any.
- hagadias — Extract game data from the Caves of Qud roguelike
- haystack — Search C Structures in a process' memory
- hikload — Download videos from a HikVision DVR/NVR
- HoMoLab — 基于Pywebview的米游社PC客户端实现
- i3dFeatureExtraction — This package helps extract i3D features with ResNet-50 backbone given a folder of videos
- image_vector_diego — no summary
- invade — A library for interacting with Windows process memory
- iTheraPY — Environment for iThera Python tools
- jkpackager — A Python library for packaging scripts into executable formats.
- karton-archive-extractor — Extractor of various archive formats for Karton framework
- karton-unpacker — A modular Karton Framework service that unpacks common packers like UPX, MPress and others using the Qilling Framework.
- kordesii — A framework for decoding encoded strings and files in malware via IDA Pro IDAPython scripting.
- KwoksTool — no summary
- Layernode — LayerProtocol blockchain
- libcsce — Cobalt Strike configuration extractor and parser library and scripts.
- LyPeUtils — A powerful x64dbg remote debugging module tools
- malduck — Malduck is your ducky companion in malware analysis journeys
- malscan — A Python package for automated static and dynamic analysis of malware samples. Supports both static and dynamic analysis techniques with feature extraction and export capabilities for static features.
- malwareproxyx — Real Time Malware Payload Injection In User Binary Downloads Utilising MITM Proxy
- malwoverview — Malwoverview is a first response tool for threat hunting.
- MATE-for-Dummies — MATE for Dummies. Scienta Omicron MATE Scripting System in Python
- memobj — A library for defining objects in memory
- metadater — A Python package providing an easy way to get a Windows app's version and other metadata from Git during development or from the executable after freezing.
- mingw-ldd — Lists dependencies of a PE (exe/dll) file
1
2