ProgramExecutableAnalyzer


NameProgramExecutableAnalyzer JSON
Version 1.1.1 PyPI version JSON
download
home_pagehttps://github.com/mauricelambert/ProgramExecutableAnalyzer
SummaryThis script analyzes MZ-PE (MS-DOS) executable.
upload_time2024-11-12 21:14:46
maintainerMaurice Lambert
docs_urlNone
authorMaurice Lambert
requires_python>=3.8
licenseGPL-3.0 License
keywords pe mz dll ms-dos program forensic analysis executable malware-analysis reverse-engineering
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # Program Executable Analyzer

## Description

This script analyzes MZ-PE (MS-DOS) executable file.

This tool is useful for malware analysis or debug/understand compiled dependencies.

 1. Verify signature and print informations about signature and trust
 2. Analyze DLLs and imported functions name
 3. Analyze exported functions name
 4. Get executable filename at the compiled time
 6. Get encodings and languages used for compilation
 7. Print informations about rich headers
 8. Get timestamps saved in executable
 9. Print informations about sections and characteristics (permissions, ect...)
 10. Print the entry point position and section
 11. Get architecture, system version, resources (Version file, Manifest)
 12. Get company name, product name, product version, copyright
 13. Sections names, sizes, addresses and characteristics
 14. Analyze MS-DOS and NT headers
 15. When *matplotlib* is installed, generate charts to compare sections on the disk and in the memory
 16. When *matplotlib* and *EntropyAnalysis* are installed, generate charts for entropy analysis (with sections)
 17. Extract overlay

TODO: analyze results to detect language and score the risk.

## Requirements

 - python3
 - Python 3 Standard library

### Optional

 - matplotlib
 - EntropyAnalysis

> *Matplotlib* and *EntropyAnalysis* are not installed by *ProgramExecutableAnalyzer* because this package can be installed on server without GUI.
>> You can install optinal required packages with the following command: `python3 -m pip install matplotlib EntropyAnalysis`

## Installation

```bash
pip install ProgramExecutableAnalyzer
```

## Usages

```bash
python3 ProgramExecutableAnalyzer.py -h
python3 ProgramExecutableAnalyzer.py executable.exe
python3 ProgramExecutableAnalyzer.py -c executable.exe  # No color
python3 ProgramExecutableAnalyzer.py -v executable.exe  # Verbose mode
```

## Screenshots

![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEheaders.png "PE Headers Analysis")
![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEversion.png "PE Version Analysis")
![PE Imports Analysis](https://mauricelambert.github.io/info/python/security/PEimports.png "PE Imports Analysis")
![PE Signature Informations](https://mauricelambert.github.io/info/python/security/Signature.png "PE Signature Informations")
![PE Entropy Analysis](https://mauricelambert.github.io/info/python/security/PEEntropyAnalysis.png "PE Entropy Analysis")
![PE Compare Section Size Charts](https://mauricelambert.github.io/info/python/security/CompareSectionsSizes.png "PE Compare Section Size Charts")

## Links

 - [Github Page](https://github.com/mauricelambert/ProgramExecutableAnalyzer/)
 - [Pypi package](https://pypi.org/project/ProgramExecutableAnalyzer/)
 - [Python Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.pyz)
 - [Windows Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.exe)

## Licence

Licensed under the [GPL, version 3](https://www.gnu.org/licenses/).

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/mauricelambert/ProgramExecutableAnalyzer",
    "name": "ProgramExecutableAnalyzer",
    "maintainer": "Maurice Lambert",
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": "mauricelambert434@gmail.com",
    "keywords": "PE, MZ, DLL, MS-DOS, Program, Forensic, Analysis, Executable, Malware-Analysis, Reverse-Engineering",
    "author": "Maurice Lambert",
    "author_email": "mauricelambert434@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/f0/7e/c1a8804738ebe9f76170863c8b84a48dacedb5f95c9f044a67e2c477ca7a/programexecutableanalyzer-1.1.1.tar.gz",
    "platform": "Windows",
    "description": "# Program Executable Analyzer\n\n## Description\n\nThis script analyzes MZ-PE (MS-DOS) executable file.\n\nThis tool is useful for malware analysis or debug/understand compiled dependencies.\n\n 1. Verify signature and print informations about signature and trust\n 2. Analyze DLLs and imported functions name\n 3. Analyze exported functions name\n 4. Get executable filename at the compiled time\n 6. Get encodings and languages used for compilation\n 7. Print informations about rich headers\n 8. Get timestamps saved in executable\n 9. Print informations about sections and characteristics (permissions, ect...)\n 10. Print the entry point position and section\n 11. Get architecture, system version, resources (Version file, Manifest)\n 12. Get company name, product name, product version, copyright\n 13. Sections names, sizes, addresses and characteristics\n 14. Analyze MS-DOS and NT headers\n 15. When *matplotlib* is installed, generate charts to compare sections on the disk and in the memory\n 16. When *matplotlib* and *EntropyAnalysis* are installed, generate charts for entropy analysis (with sections)\n 17. Extract overlay\n\nTODO: analyze results to detect language and score the risk.\n\n## Requirements\n\n - python3\n - Python 3 Standard library\n\n### Optional\n\n - matplotlib\n - EntropyAnalysis\n\n> *Matplotlib* and *EntropyAnalysis* are not installed by *ProgramExecutableAnalyzer* because this package can be installed on server without GUI.\n>> You can install optinal required packages with the following command: `python3 -m pip install matplotlib EntropyAnalysis`\n\n## Installation\n\n```bash\npip install ProgramExecutableAnalyzer\n```\n\n## Usages\n\n```bash\npython3 ProgramExecutableAnalyzer.py -h\npython3 ProgramExecutableAnalyzer.py executable.exe\npython3 ProgramExecutableAnalyzer.py -c executable.exe  # No color\npython3 ProgramExecutableAnalyzer.py -v executable.exe  # Verbose mode\n```\n\n## Screenshots\n\n![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEheaders.png \"PE Headers Analysis\")\n![PE Headers Analysis](https://mauricelambert.github.io/info/python/security/PEversion.png \"PE Version Analysis\")\n![PE Imports Analysis](https://mauricelambert.github.io/info/python/security/PEimports.png \"PE Imports Analysis\")\n![PE Signature Informations](https://mauricelambert.github.io/info/python/security/Signature.png \"PE Signature Informations\")\n![PE Entropy Analysis](https://mauricelambert.github.io/info/python/security/PEEntropyAnalysis.png \"PE Entropy Analysis\")\n![PE Compare Section Size Charts](https://mauricelambert.github.io/info/python/security/CompareSectionsSizes.png \"PE Compare Section Size Charts\")\n\n## Links\n\n - [Github Page](https://github.com/mauricelambert/ProgramExecutableAnalyzer/)\n - [Pypi package](https://pypi.org/project/ProgramExecutableAnalyzer/)\n - [Python Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.pyz)\n - [Windows Executable](https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.exe)\n\n## Licence\n\nLicensed under the [GPL, version 3](https://www.gnu.org/licenses/).\n",
    "bugtrack_url": null,
    "license": "GPL-3.0 License",
    "summary": "This script analyzes MZ-PE (MS-DOS) executable.",
    "version": "1.1.1",
    "project_urls": {
        "Executable": "https://mauricelambert.github.io/info/python/security/ProgramExecutableAnalyzer.pyz",
        "Homepage": "https://github.com/mauricelambert/ProgramExecutableAnalyzer"
    },
    "split_keywords": [
        "pe",
        " mz",
        " dll",
        " ms-dos",
        " program",
        " forensic",
        " analysis",
        " executable",
        " malware-analysis",
        " reverse-engineering"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "f07ec1a8804738ebe9f76170863c8b84a48dacedb5f95c9f044a67e2c477ca7a",
                "md5": "f857ef11cf4b896d090d5a71ddd754f8",
                "sha256": "d382cb1f2435cac39a6d31eb9248b7d14c4b651b18eff1d7c1e96c4aee0b355b"
            },
            "downloads": -1,
            "filename": "programexecutableanalyzer-1.1.1.tar.gz",
            "has_sig": false,
            "md5_digest": "f857ef11cf4b896d090d5a71ddd754f8",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 36880,
            "upload_time": "2024-11-12T21:14:46",
            "upload_time_iso_8601": "2024-11-12T21:14:46.871698Z",
            "url": "https://files.pythonhosted.org/packages/f0/7e/c1a8804738ebe9f76170863c8b84a48dacedb5f95c9f044a67e2c477ca7a/programexecutableanalyzer-1.1.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-11-12 21:14:46",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "mauricelambert",
    "github_project": "ProgramExecutableAnalyzer",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "lcname": "programexecutableanalyzer"
}
        
Elapsed time: 0.68113s