PESTO – PE (Files) Statistical Tool

PESTO is a Python script that extracts and saves in a database some PE file security characteristics or flags searching for every PE binary in a whole directory, and saving results in a database.

PESTO checks for architecture flag in the header, and for the following security flags: ASLR, NO_SEH, DEP and CFG. Code is clear enough to modify flags and formats to your own needs.

Functionality

The script just needs a path and a tag. The program will go through the path and subdirectories searching for .DLL and .EXE files and extracting the flags in the PE header (thanks to PEfile python library).

Also Read – Pockint : A Portable OSINT Swiss Army Knife for DFIR/OSINT Professionals

The program requires a tag that will be used as a suffix for logs and database filenames, so different analysis can be done in the same directory.

The information provided by the script is:

  • Percentage of .DLL and .EXE files with i386, AMD64, IA64 or other architecture.
  • Percentage of ASLR, NO_SEH, DEP and CFG flags enabled or disabled in the headers.
  • After finishing the analysis it will prompt to export results in a SQL or CSV format.

It will create as well a .db file which is a sqlite file with the information collected.

R K

Recent Posts

evilrdp : The Ultimate Tool For Elevated RDP Command Control

In the realm of remote desktop management, evilrdp stands out as a powerful tool designed…

3 hours ago

wa-tunnel – TCP Tunneling Through Whatsapp

wa-tunnel is an innovative tool designed to tunnel TCP data through two WhatsApp accounts, leveraging…

3 hours ago

Deepfake Apps : How They Function And Their Applications

Deepfake apps are sophisticated tools that utilize advanced AI algorithms, particularly Generative Adversarial Networks (GANs),…

3 hours ago

Subdominator – Unleash The Power Of Subdomain Enumeration

Subdominator is a lightweight and fast tool designed for passive subdomain enumeration, primarily used in…

3 hours ago

Doing The Due Diligence : Analyzing The Next.js Middleware Bypass (CVE-2025-29927)

A critical vulnerability, CVE-2025-29927, has recently been identified in the Next.js ecosystem, allowing attackers to…

4 hours ago

Awesome-Redteam : A Comprehensive Guide To Advanced Red Teaming Tools And Techniques

The Awesome-Redteam repository is a comprehensive collection of tools and resources designed for red teaming…

7 hours ago