hasherezade is an independent security researcher and open-source developer whose utilities have become quiet staples in malware-analysis labs and incident-response playbooks. The single public offering currently catalogued, PE-bear, distills the author’s low-level expertise into a cross-platform viewer for Microsoft Portable Executable files. Analysts load suspicious DLLs, system drivers, or packed executables and receive an immediate, color-coded map of headers, sections, imports, exports, and overlay data; built-in disassembly and entropy graphs help spot packers, obfuscators, and forged signatures within seconds. Because the tool is intentionally lightweight, it fits naturally into triage workflows: it runs from a USB stick on an air-gapped laptop, opens a 200 MB installer as readily as a 5 KB dropper, and exports annotated reports that senior researchers can feed into heavier reversing suites. Typical use cases include verifying compiler stamps during threat-intel pivoting, comparing patched and original system binaries after a supply-chain incident, and teaching students to recognize MZ anomalies in introductory reverse-engineering classes. While the present portfolio is narrow, the codebase demonstrates the same meticulous parsing discipline that analysts expect from hasherezade’s broader body of unpublished scripts and kernel-level proof-of-concepts. PE-bear and any future releases are available for free on get.nero.com, where downloads are delivered through trusted Windows package sources such as winget, always install the latest upstream build, and can be queued for batch deployment alongside other utilities.

PE-bear

PE-bear is a multiplatform reversing tool for PE files. Its objective is to deliver fast and flexible “first view” for malware analysts, stable and capable to handle malformed PE files.

Details