Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

zaas2/StudyPE_2026

Open more actions menu

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
6 Commits
 
 
 
 
 
 

Repository files navigation

StudyPE+ (v2.0.6)

Modern PE / ARM / .NET Analyzer and Editor Rebuilt with Qt 5.15

Version Platform Arch

StudyPE+ is a powerful, high-performance binary analysis tool designed for reverse engineers and malware analysts. Rebuilt from the ground up using the Qt 5.15 framework, it offers a modern UI with unmatched speed.


✨ Key Features

  • 🚀 High Performance: Built with Lazy Loading technology. Open multi-GB PE files instantly with no size limitations.
  • 🛡️ Multi-Arch Support: Full support for PE32/64, ARM/ARM64, and .NET Framework/Core metadata parsing.
  • 🔍 Advanced Engines:
    • Capstone 6.0 for robust disassembly.
    • Detect It Easy (DIE) for accurate packer and signature identification.
  • 🛠️ Visual Editing: Interactive section manipulation (Add, Delete, Merge, Offset correction).
  • 📦 Directory Analysis: Deep parsing of Export, Import, TLS, Exception Tables, Load Config, and Rich Header.
  • 🎨 Modern UI: High-DPI support, Dark/Light theme switching, and multi-tab interface.
  • 🧰 Integrated Toolbox: Hex Editor, Process Manager, and Crypto tools (RSA, Hash/HMAC, Base64).

📸 Screenshots


Main Analysis Interface (Dark Theme)


📥 Download

Grab the latest binaries from the Releases Page.

Note: As a security/technical tool, some anti-virus software may trigger false positives. Please refer to the VirusTotal Report for peace of mind.


❤️ Credits

StudyPE+ stands on the shoulders of these great projects:


Developed by zaas 2025

Packages

 
 
 

Contributors

Morty Proxy This is a proxified and sanitized view of the page, visit original site.