hasherezade/pe_unmapper
GitHub: hasherezade/pe_unmapper
一个小巧的命令行工具,用于在PE文件的原始对齐和虚拟对齐格式之间进行转换,方便还原和分析从内存中导出的PE文件。
Stars: 115 | Forks: 16
# pe_unmapper
[](https://ci.appveyor.com/project/hasherezade/pe-unmapper)
[](https://github.com/hasherezade/pe_unmapper/releases)
[](https://github.com/hasherezade/pe_unmapper/releases)
用于在 PE 对齐方式(raw 和 virtual)之间进行转换的小工具。
支持便捷的 PE unmapping:有助于还原从内存中 dump 下来的可执行文件。
用法:
```
Args:
Required:
/in : Input file name
Optional:
/base : Base address where the image was loaded: in hex
/out : Output file name
/mode : Choose the conversion mode:
U: UNMAP (Virtual to Raw) [DEFAULT]
M: MAP (Raw to Virtual)
R: REALIGN (Virtual to Raw, where: Raw == Virtual)
```
示例:
```
pe_unmapper.exe /in _02660000.mem /base 02660000 /out payload.dll
```
标签:C/C++, DAST, DNS 反向解析, DNS 解析, meg, PE Dump还原, PE Unmapper, PE文件处理, PE格式转换, Raw to Virtual, SecList, Virtual to Raw, 事务性I/O, 云资产清单, 信息安全, 内存取证, 内存对齐, 可执行文件修复, 恶意软件分析, 磁盘对齐, 端点检测与响应, 脱壳工具, 逆向工程