Artifact readpe_0.84-1+b1_arm64

Metadata
deb_control_files:
- control
- md5sums
- shlibs
- triggers
deb_fields:
  Architecture: arm64
  Breaks: pev (<< 0.82-1~)
  Depends: libpe1t64 (>= 0.84), libc6 (>= 2.38), libssl3t64 (>= 3.0.0)
  Description: |-
    command-line tools to manipulate Windows PE files
     readpe is a toolkit designed to analyze Microsoft Windows PE (Portable
     Executable) binary files. Its tools can parse and compare PE32/PE32+
     executable files (EXE, DLL, OCX, etc), and analyze them in search of
     suspicious characteristics.
     .
     It can be used to get information from those executable files, such as
     headers, sections, resources and more. It also provides tools to disassemble PE
     files and determine their security mitigations. It is useful for application
     security research, digital forensics and incident response, and malware
     analysis.
     .
     It is similar to elftools, only designed for PE files. It has more features
     than other more specific PE tools, such as icoextract or ntldd.
     .
     This package provides the ofs2rva, pedis, pehash, peldd, pepack, peres,
     pescan, pesec, pestr, readpe and rva2ofs commands.
  Homepage: https://github.com/mentebinaria/readpe/wiki
  Installed-Size: '1938'
  Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
  Package: readpe
  Priority: optional
  Replaces: pev (<< 0.82-1~)
  Section: utils
  Source: readpe (0.84-1)
  Version: 0.84-1+b1
srcpkg_name: readpe
srcpkg_version: 0.84-1

File

readpe_0.84-1+b1_arm64.deb
Binary file readpe_0.84-1+b1_arm64.deb cannot be displayed. you can view it raw or download it instead.

Relations

Relation Direction Type Name
built-using Source package readpe_0.84-1

binary package System mirror trixie from https://deb.debian.org/debian - 1 week, 6 days ago 0 minutes
BETA