• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

PortEx: Java library for static malware analysis of Portable Executable files

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,604
Solutions
2
Reputation
32
Reaction score
100,446
Points
2,313
Credits
32,560
‎6 Years of Service‎
 
76%
687474703a2f2f692e696d6775722e636f6d2f374e427a65344f2e706e67


PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala, and targeted at Java applications.

Features

    Reading header information from: MSDOS Header, COFF File Header, Optional Header, Section Table
    Reading PE structures: Imports, Resources, Exports, Debug Directory, Relocations, Delay Load Imports, Bound Imports
    Dumping of sections, resources, overlay, embedded ZIP, JAR or .class files
    Scanning for file format anomalies, including structural anomalies, deprecated, reserved, wrong or non-default values.
    Visualize PE file structure, local entropies and byteplot of the file with variable colors and sizes
    Calculate Shannon Entropy and Chi Squared for files and sections
    Calculate ImpHash and Rich and RichPV hash values for files and sections
    Parse RichHeader and verify checksum
    Calculate and verify Optional Header checksum
    Scan for PEiD signatures, internal file type signatures or your own signature database
    Scan for Jar to EXE wrapper (e.g. exe4j, jsmooth, jar2exe, launch4j)
    Extract Unicode and ASCII strings contained in the file
    Extraction and conversion of .ICO files from icons in the resource section
    Extraction of version information and manifest from the file
    Reading .NET metadata and streams (Alpha)

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top