How to Install and Uninstall readpe Package on Kali Linux
Last updated: December 30,2024
1. Install "readpe" package
This guide let you learn how to install readpe on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
readpe
Copied
2. Uninstall "readpe" package
This guide let you learn how to uninstall readpe on Kali Linux:
$
sudo apt remove
readpe
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the readpe package on Kali Linux
Package: readpe
Version: 0.82-3
Installed-Size: 1260
Maintainer: Debian Security Tools
Architecture: amd64
Replaces: pev (<< 0.82-1~)
Depends: libpe1 (>= 0.82), libc6 (>= 2.34), libssl3 (>= 3.0.0)
Breaks: pev (<< 0.82-1~)
Size: 149308
SHA256: 68b1ab42735b0d162862b408d1fd41f2ecb0b4e436d0cc96c41f63856c2a3f1e
SHA1: 6cc6797f4fc14088e86ea008fbed5f3e6f538c87
MD5sum: 78490d4eed4c4f74e32bc578afa68aa3
Description: command-line tools to manipulate Windows PE files
readpe is a toolkit designed to analyze Microsoft Windows PE (Portable
Executable) binary files. Its tools can parse and compare PE32/PE32+
executable files (EXE, DLL, OCX, etc), and analyze them in search of
suspicious characteristics.
.
It can be used to get information from those executable files, such as
headers, sections, resources and more. It also provides tools to disassemble PE
files and determine their security mitigations. It is useful for application
security research, digital forensics and incident response, and malware
analysis.
.
It is similar to elftools, only designed for PE files. It has more features
than other more specific PE tools, such as icoextract or ntldd.
.
This package provides the ofs2rva, pedis, pehash, peldd, pepack, peres,
pescan, pesec, pestr, readpe and rva2ofs commands.
Description-md5:
Homepage: https://github.com/mentebinaria/readpe/wiki
Section: utils
Priority: optional
Filename: pool/main/r/readpe/readpe_0.82-3_amd64.deb
Version: 0.82-3
Installed-Size: 1260
Maintainer: Debian Security Tools
Architecture: amd64
Replaces: pev (<< 0.82-1~)
Depends: libpe1 (>= 0.82), libc6 (>= 2.34), libssl3 (>= 3.0.0)
Breaks: pev (<< 0.82-1~)
Size: 149308
SHA256: 68b1ab42735b0d162862b408d1fd41f2ecb0b4e436d0cc96c41f63856c2a3f1e
SHA1: 6cc6797f4fc14088e86ea008fbed5f3e6f538c87
MD5sum: 78490d4eed4c4f74e32bc578afa68aa3
Description: command-line tools to manipulate Windows PE files
readpe is a toolkit designed to analyze Microsoft Windows PE (Portable
Executable) binary files. Its tools can parse and compare PE32/PE32+
executable files (EXE, DLL, OCX, etc), and analyze them in search of
suspicious characteristics.
.
It can be used to get information from those executable files, such as
headers, sections, resources and more. It also provides tools to disassemble PE
files and determine their security mitigations. It is useful for application
security research, digital forensics and incident response, and malware
analysis.
.
It is similar to elftools, only designed for PE files. It has more features
than other more specific PE tools, such as icoextract or ntldd.
.
This package provides the ofs2rva, pedis, pehash, peldd, pepack, peres,
pescan, pesec, pestr, readpe and rva2ofs commands.
Description-md5:
Homepage: https://github.com/mentebinaria/readpe/wiki
Section: utils
Priority: optional
Filename: pool/main/r/readpe/readpe_0.82-3_amd64.deb