PE Explorer 1.98 R3 by Heaventools Software is Released
Heaventools Software announced the latest version of its tool for inspection and editing of Windows executable files, PE Explorer 1.98 R3. The product gives Windows software engineers and analysts a combination of abilities, including disassembly and inspection of unknown binaries, modification of the properties of executable files, customization and translation features. With PE Explorer in place, they can apply a professional approach to research and reverse engineering of win32 PE executable files. In addition to its previous roster of PE file types support, PE Explorer R3 now provides support for files modified with a number of UPX scramblers: Advanced UPX Scrambler, UPoLyX, UPX Lock, and several others.
By leveraging the capabilities of PE Explorer Disassembler, customers can rapidly analyze what procedures and libraries a malware executable uses without ever activating the executable unlike a debugger which would normally have to. Previously, they had to run the executable and damp the packed segments right after the executable had been completely unpacked in memory. Now users can open these obfuscated files with PE Explorer even without knowing that: the files will be unpacked automatically.
A rich visual interface and trouble-free, advanced capabilities makes it easy and fun for new users to get started with digging into any executable. PE Explorer offers a thorough look at PE (portable executable) file structure and all of the resources in the file, and tells you just about every little detail you could possibly want to know about a PE file. Once inside, file structure can be analyzed and optimized, problems diagnosed, changes made and resources repaired. Power users will appreciate the plug-in API and ability to view a list of the files that are required for an application to run or for a DLL to load, a list of exported and imported functions, the manifest wizard to easily mark the application as XP-enabled.
PE Explorer runs on Windows 98/NT/2000/XP/2003.
write your comments about the article :: © 2006 Computing News :: home page