From Collaborative RCE Tool Library
|Current version:||1.41 (Deluxe b)|
|Last updated:||September 30, 2009|
|Direct D/L link:||Locally archived copy|
|Description:||LordPE is a tool e.g. for system programmers which is able to edit/view many parts of PE (Portable Executable) files, dump them from memory, optimize them, validate, analyze, edit,...
* Task viewer/dumper
* Huge PE editor (with big ImportTable viewer, ...)
* Break'n'Enter (break at the EntryPoint of dll or exe files)
* PE Rebuilder
* The first GUI PE editor in the world supporting the new PE32+ (64bit) format ?! (only editing support - no rebuilding, dumping, comparing etc.)
* New plugin interface added! You can develop LordPE Dump Engines (LDE) now.
Look at \Docs\LDE.tXt for more information.
* Added LDE: IntelliDump which can dump .NET CLR processes
* Added structure lister for SectionHeaderTable, PE headers and DataDirectories (the "L" buttons)
* Added hex edit buttons (the "H" buttons) in the DataDirectoryTable viewer
* Added PE.OptionalHeader.Magic and PE.OptionalHeader.NumberOfRvaAndSizes to the PE editor
* TLSTable DataDirectory is now editable
* Possibility to increment/decrement the number of DataDirectories added
* Etc etc etc...
|Related URLs:||No related URLs have been submitted for this tool yet|
Here below you will find useful notes about this tool, left by other users.
You are welcome to add your own useful notes here, or edit any existing notes to improve or extend them.
Trojan horse in a file!
AVG found something: LordPE 1.41 Deluxe b.zip:\LPE-DLX_1.4.zip:\LDS_Clients\CoolDump1.4\Genoep.dll";"Trojan horse Generic15.ABQO";
No, there is no trojan in it. Seriously, if only generic malware is found and on top of that by only a fraction of AV-engines you can't say it's malware. Errrr..., you can, but hardly anybody will agree.
(please also edit it if you think it fits well in some additional category, since this can also be controlled)