Software Alternatives & Reviews

Binary Ninja VS PE Explorer

Compare Binary Ninja VS PE Explorer and see what are their differences

Binary Ninja logo Binary Ninja

A reverse engineering platform and GUI

PE Explorer logo PE Explorer

EXE Editor, Resource Editor, Disassembler, Section Editor, Dependency Scanner, Quick Function Syntax Lookup. Analyze win32 executable files, including headers, procedures, and libraries. Edit icon resources and more.
  • Binary Ninja Landing page
    Landing page //
    2023-09-28
  • PE Explorer Landing page
    Landing page //
    2023-07-02

PE Explorer is a feature-rich and budget priced set of tools for those whose daily work involves reverse engineering of software and exploiting code, source code reviews, testing and evaluation of vulnerabilities with a very strong emphasis on peeking inside EXE applications and DLL packages.

PE Explorer leaves you with only minimal work to do in order to get an analysis of a piece of software. Once you have selected the file you wish to examine, PE Explorer will analyze the file and display a summary of the PE header information, and all of the resources contained in the PE file. From here, the tool allows you to explore the specific elements within an executable file. Target file structure can be analyzed and optimized, problems diagnosed, changes made, resources repaired, assembly source code reconstructed.

With PE Explorer, software engineers and security specialists can apply a professional approach to research of binary files. PE Explorer utilizes a qualitative algorithm designed to reconstruct the assembly language source code of target binary files (EXE, DLL, OCX) with the highest degree of accuracy possible. The product also allows you to remove both debugging information and the base relocation table from an executable, as well as view and edit the various section headers. PE Explorer includes a host of unique features, including the ability to open problem executable files and edit the hidden data that the other editors simply cannot see, an unparalleled range of supported resource types, automatic UPX unpacking, adding of modern Windows control styles to older applications, support for custom plug-ins, and more.

Binary Ninja

Pricing URL
-
$ Details
Platforms
-
Release Date
-

Binary Ninja videos

Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1

More videos:

  • Demo - 312 Using Binary Ninja for Modern Malware Analysis Dr Jared DeMott Mr Josh Stroschein
  • Review - Binary Ninja Overview

PE Explorer videos

Raycity เปลี่ยนลายของSkinของตัวPatcherด้วย PE Explorer

Category Popularity

0-100% (relative to Binary Ninja and PE Explorer)
IDE
50 50%
50% 50
Software Development
49 49%
51% 51
Decompiler
68 68%
32% 32
Developer Tools
0 0%
100% 100

Questions and Answers

As answered by people managing Binary Ninja and PE Explorer.

Who are some of the biggest customers of your product?

PE Explorer's answer:

  • Microsoft
  • Apple
  • Adobe
  • Symantec

How would you describe your primary audience?

PE Explorer's answer:

  • Security professionals
  • Reverse engineers
  • Developers
  • Antivirus and forensic specialists

What makes your product unique?

PE Explorer's answer:

PE Explorer includes a host of unique features, including the ability to open problem executable files and edit the hidden data that the other editors simply cannot see.

User comments

Share your experience with using Binary Ninja and PE Explorer. For example, how are they different and which one is better?
Log in or Post with

Social recommendations and mentions

Based on our record, Binary Ninja seems to be more popular. It has been mentiond 9 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

Binary Ninja mentions (9)

  • [Media] I'm currently learning Rust. Out of curiosity, I opened the resulting binary as a text file, and among the garbled text characters, I saw this weird text. Is this normal or is there something wrong with the compiled binary? It's the "Hello, World!" sample program and it executes normally.
    If you really want to poke around in the binary, you can use a decompiler like IDA, Ghidra, or Binary Ninja's free version. Source: 7 months ago
  • Ida Free
    Still $$$ for crippled functionality. As an alternative, https://binary.ninja is gaining traction at work. - Source: Hacker News / 10 months ago
  • Teaching A Machine To Identify Vulnerabilities (Part 1)
    As I said, a regular text editor won’t do for reading a binary file, so I needed to choose a disassembler to break the challenge binaries out into their basic blocks. I chose to use Binary Ninja because it has a very easy-to-use Python API, and it’s hobbyist-level cheap (for comparison, the industry-standard disassembler is IDA Pro, which they will sell to you for roughly an arm, and continue to pick off your... - Source: dev.to / over 3 years ago
  • Why do most hackers base their personality around hacking?
    It’s an awesome reverse engineering tool (https://binary.ninja). Has really nice api support so you can basically automate anything and make plugins for custom architectures and stuff like that. Source: almost 2 years ago
  • Introducing Decompiler Explorer
    It's basically the opposite of https://godbolt.org/ -- put in binary, get out decompilation amongst many decompilers. It's open source (though you need a Binary Ninja and Hex-Rays license to run internally -- you'll want to check with the respective companies to make sure your particular license is acceptable for use even internally first!). Source: almost 2 years ago
View more

PE Explorer mentions (0)

We have not tracked any mentions of PE Explorer yet. Tracking of PE Explorer recommendations started around Mar 2021.

What are some alternatives?

When comparing Binary Ninja and PE Explorer, you can also consider the following products

IDA - The best-of-breed binary code analysis tool, an indispensable item in the toolbox of world-class software analysts, reverse engineers, malware analyst and cybersecurity professionals.

Resource Hacker - Resource Hacker has been designed to be the complete resource editing tool.

Ghidra - Software Reverse Engineering (SRE) Framework

Universal Extractor 2 - Universal Extractor 2 is an unofficial updated and extended version of the original UniExtract by...

OllyDbg - OllyDbg is a 32-bit assembler level analysing debugger.

Resource Tuner - Resource Editor: modify EXE file's resources, change Icons inside EXE, DLL, MUN. View, search, extract, replace, edit, add and delete the embedded resources of executable program files.