PE Explorer is a feature-rich and budget priced set of tools for those whose daily work involves reverse engineering of software and exploiting code, source code reviews, testing and evaluation of vulnerabilities with a very strong emphasis on peeking inside EXE applications and DLL packages.
PE Explorer leaves you with only minimal work to do in order to get an analysis of a piece of software. Once you have selected the file you wish to examine, PE Explorer will analyze the file and display a summary of the PE header information, and all of the resources contained in the PE file. From here, the tool allows you to explore the specific elements within an executable file. Target file structure can be analyzed and optimized, problems diagnosed, changes made, resources repaired, assembly source code reconstructed.
With PE Explorer, software engineers and security specialists can apply a professional approach to research of binary files. PE Explorer utilizes a qualitative algorithm designed to reconstruct the assembly language source code of target binary files (EXE, DLL, OCX) with the highest degree of accuracy possible. The product also allows you to remove both debugging information and the base relocation table from an executable, as well as view and edit the various section headers. PE Explorer includes a host of unique features, including the ability to open problem executable files and edit the hidden data that the other editors simply cannot see, an unparalleled range of supported resource types, automatic UPX unpacking, adding of modern Windows control styles to older applications, support for custom plug-ins, and more.
PE Explorer's answer
PE Explorer's answer
PE Explorer's answer
PE Explorer includes a host of unique features, including the ability to open problem executable files and edit the hidden data that the other editors simply cannot see.
Based on our record, Jotti seems to be more popular. It has been mentiond 13 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Everyone of you "pirates" should be using a image of your hard-drive to restore from. This should have been done after your windows installation, updates, drivers, OS tweaks, etc. You use the free version of Macrium Reflect, you use the "make a boot thumb drive" option with the software and it will automatically partition the USB drive for you and on the non-boot partition, you stick the image. Anytime you think... Source: about 1 year ago
Anything you execute, including installers, run through VirusTotal, Jotti AntiVirus, or my personal favorite: ShieldPro. Source: over 1 year ago
Just scanned the apk on https://virusscan.jotti.org which also uses Ikarus and says that it's fine. Only Fortinet gives the same result. Source: over 1 year ago
Let me give you a pro tip from guys doing netsec since the 90s: Get rid of 3rd party AV and use https://virusscan.jotti.org/ for suspicious downloads. Source: over 1 year ago
There is also https://virusscan.jotti.org/ but virustotal is the largest one and communicates with the companies whose scanners they use to report new threats. Source: about 2 years ago
Resource Hacker - Resource Hacker has been designed to be the complete resource editing tool.
VirusTotal - VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick...
Universal Extractor 2 - Universal Extractor 2 is an unofficial updated and extended version of the original UniExtract by...
Metadefender - Metadefender, by OPSWAT, allows you to quickly multi-scan your files for malware using 43 antivirus...
HxD - HxD is a carefully designed and fast hex editor which, additionally to raw disk editing and...
Hybrid-Analysis.com - Hybrid-Analysis.com is a free malware analysis service powered by payload-security.com.