deb_control_files:
- control
- md5sums
- shlibs
- triggers
deb_fields:
Architecture: arm64
Breaks: pev (<< 0.82-1~)
Depends: libpe1t64 (>= 0.84), libc6 (>= 2.38), libssl3t64 (>= 3.0.0)
Description: |-
command-line tools to manipulate Windows PE files
readpe is a toolkit designed to analyze Microsoft Windows PE (Portable
Executable) binary files. Its tools can parse and compare PE32/PE32+
executable files (EXE, DLL, OCX, etc), and analyze them in search of
suspicious characteristics.
.
It can be used to get information from those executable files, such as
headers, sections, resources and more. It also provides tools to disassemble PE
files and determine their security mitigations. It is useful for application
security research, digital forensics and incident response, and malware
analysis.
.
It is similar to elftools, only designed for PE files. It has more features
than other more specific PE tools, such as icoextract or ntldd.
.
This package provides the ofs2rva, pedis, pehash, peldd, pepack, peres,
pescan, pesec, pestr, readpe and rva2ofs commands.
Homepage: https://github.com/mentebinaria/readpe/wiki
Installed-Size: '1938'
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Package: readpe
Priority: optional
Replaces: pev (<< 0.82-1~)
Section: utils
Source: readpe (0.84-1)
Version: 0.84-1+b1
srcpkg_name: readpe
srcpkg_version: 0.84-1