PE Explorer is a feature-rich and budget priced set of tools for those whose daily work involves reverse engineering of software and exploiting code, source code reviews, testing and evaluation of vulnerabilities with a very strong emphasis on peeking inside EXE applications and DLL packages.
PE Explorer leaves you with only minimal work to do in order to get an analysis of a piece of software. Once you have selected the file you wish to examine, PE Explorer will analyze the file and display a summary of the PE header information, and all of the resources contained in the PE file. From here, the tool allows you to explore the specific elements within an executable file. Target file structure can be analyzed and optimized, problems diagnosed, changes made, resources repaired, assembly source code reconstructed.
With PE Explorer, software engineers and security specialists can apply a professional approach to research of binary files. PE Explorer utilizes a qualitative algorithm designed to reconstruct the assembly language source code of target binary files (EXE, DLL, OCX) with the highest degree of accuracy possible. The product also allows you to remove both debugging information and the base relocation table from an executable, as well as view and edit the various section headers. PE Explorer includes a host of unique features, including the ability to open problem executable files and edit the hidden data that the other editors simply cannot see, an unparalleled range of supported resource types, automatic UPX unpacking, adding of modern Windows control styles to older applications, support for custom plug-ins, and more.
SaaS, Premium Self-Hosted, or FREE OSS Self-Hosted
Enterprise Single Sign On (SSO) SAML SSO enables a secure authentication via an organization’s Identity Provider (IdP), as opposed to users or IT admins managing thousands, of usernames and passwords. With our product SAML Jackson, enterprise users can access your product via one of their secure IdPs (like Okta, Microsoft Azure, AWS, etc), which manages access and security for the entire organization.
Directory Sync Organizations use directories from different providers to manage users and enforce their access to organization resources. By integrating our Directory Sync product into your solution you can activate and deactivate user accounts, create groups, and keep your app in sync with the user directory in real-time. Supports the SCIM 2.0 protocol.
Additionally, we offer Audit Logs to track critical events in your application and a Data Privacy Vault to safeguard sensitive data.
PE Explorer's answer
BoxyHQ's answer:
We value the confidentiality of our large enterprise clients due to NDA agreements. However, some of our notable customers include Cal.com, Dub, Supademo, Spike, among many others.
PE Explorer's answer
BoxyHQ's answer:
BoxyHQ's primary audience encompasses:
PE Explorer's answer
PE Explorer includes a host of unique features, including the ability to open problem executable files and edit the hidden data that the other editors simply cannot see.
BoxyHQ's answer:
BoxyHQ stands out for its comprehensive suite of security building blocks tailored specifically for developers. With features like SAML/OIDC Single Sign-On (SSO) and Directory Sync with SCIM 2.0, BoxyHQ simplifies identity management and access control for B2B SaaS companies. Its focus on providing a seamless and customizable solution empowers developers to enhance security without compromising user experience. Additionally, BoxyHQ offers Audit Logs to track critical events within the product and a Privacy Vault, an API to protect sensitive data.
BoxyHQ's answer:
BoxyHQ stands out for several reasons:
BoxyHQ's answer:
The inception of BoxyHQ is deeply linked with Deepak's journey as the former CTO of a cybersecurity scaleup. In his role, Deepak wrestled with the challenge of allocating resources to enterprise compliance features that diverged from their core value proposition. Alongside Sama, they witnessed the escalating tide of cyber crimes, compounded by the concerning statistic that around 70% of development teams often bypass essential security measures due to time constraints. Motivated by this shared purpose of bringing security earlier in the developer live cycle, they embarked on a mission to address these challenges head-on. BoxyHQ emerged as a solution designed to automate product security and provide low-code APIs for seamless integration, empowering developers to implement enterprise-compliant security measures effortlessly. Through BoxyHQ, Deepak and the team strive to alleviate the burden on development teams while fortifying organizations against the escalating threats posed by cyber crimes.
BoxyHQ's answer:
BoxyHQ uses the following technologies: - Next.js - PostgreSQL - Docker - Kubernetes
Resource Hacker - Resource Hacker has been designed to be the complete resource editing tool.
Auth0 - Auth0 is a program for people to get authentication and authorization services for their own business use.
Universal Extractor 2 - Universal Extractor 2 is an unofficial updated and extended version of the original UniExtract by...
Skyflow - Skyflow’s data privacy vaults deliver security, compliance and governance via a simple API
Resource Tuner - Resource Editor: modify EXE file's resources, change Icons inside EXE, DLL, MUN. View, search, extract, replace, edit, add and delete the embedded resources of executable program files.
Frontegg - Elegant user management, tailor-made for B2B SaaS