Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Tech
    • Downloads
      • Malwarebytes
      • Exploits
      • Paper Downloads
    • Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Tech
    • Downloads
      • Malwarebytes
      • Exploits
      • Paper Downloads
    • Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Security

PE-Bear – version 0.2.5 Released

Paul Anderson by Paul Anderson
September 28, 2013 - Updated on May 25, 2022
in Security, Tools
Reading Time: 1 min read
0
layout1
32
SHARES
540
VIEWS
Share on FacebookShare on Twitter

What it is?

PE-Bear is a new project aimed at reversing executable or PE files.

You might also like

US Government Targets North Korea-Linked Cyber Threat, Lazarus, and Seizes Crypto Service

Researchers Expose Gaza Charity Crypto Scam

Europol and Local Forces Disband Multi-Million Dollar Vishing Ring

Objective: to deliver a fast and flexible “first view” tool for malware analysts. Stable and capable to handle malformed PE files.

Download

The latest version is 0.2.5 (beta), released: 26.09.2013:

*requires Microsoft Visual C++ 2010 Redistributable Package, available here:
Redist 32bit
Redist 64bit

Features and details

  • handles PE32 and PE64
  • views multiple files in parallel
  • recognizes known packers (by signatures)
  • fast disassembler – starting from any chosen RVA/File offset
  • visualization of sections layout
  • selective comparing of two chosen PE files
  • integration with windows explorer menu
  • and more…

Official Site: http://hshrzd.wordpress.com/pe-bear/

 

Download

 

Tags: downloadPE-BearReverse Engineeringtool
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the bottom of the page.

Recommended For You

Cyber threat Lazarus, active for a decade, stole $2B+ in digital assets. Sinbad.io crypto mixer aids laundering. Despite sanctions, Lazarus remains resilient, evolving tactics for complex attacks.

US Government Targets North Korea-Linked Cyber Threat, Lazarus, and Seizes Crypto Service

November 30, 2023
Researchers Expose Gaza Charity Crypto Scam

Researchers Expose Gaza Charity Crypto Scam

November 20, 2023

Europol and Local Forces Disband Multi-Million Dollar Vishing Ring

November 19, 2023

Chinese Scammers Cloning Websites for Massive Gambling Scam in Asia-Pacific Region

November 15, 2023

Cybersecurity Breach Paralyzes Key Australian Ports: National Response Initiated

November 12, 2023

Latest Ukrainian Power Outage Linked to Sandworm Cyber Group

November 9, 2023
Next Post
Hackers For Hire: Icefog

Hackers For Hire: Icefog

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

FBI dismantles IPStorm botnet, arrests Sergei Makinin, ending a 4-year cybercrime spree. A major win against global online threats.

FBI Shuts Down Notorious IPStorm Botnet, Arrests Mastermind Sergei Makinin after Four-Year Cybercrime Spree

November 21, 2023
Researchers Expose Gaza Charity Crypto Scam

Researchers Expose Gaza Charity Crypto Scam

November 20, 2023
Global success: Europol, Czech, and Ukrainian police unite to dismantle a multi-million dollar vishing ring targeting Czech bank customers. Ten arrests made in a joint effort against cybercrime.

Europol and Local Forces Disband Multi-Million Dollar Vishing Ring

November 19, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact us
  • Press
  • Writers
  • Privacy Policy

© 2023 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
    • Tools
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Contact Us
    • Press
  • Privacy Policy

© 2023 ZeroSecurity, All Rights Reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.