Download PEiD v0.95 - detect packers, protectors, and cryptors in executables; ideal for malware analysis and reverse-engineering.
Quick overview
PEiD v0.95 is a lightweight Windows tool used to identify packers, protectors, and cryptors that authors use to obfuscate executables. It’s handy for reverse engineers, malware analysts, and security researchers who need a fast way to guess how a binary was packed or protected.
Key features
When to use PEiD
Quick tips
Quick overview
PEiD v0.95 is a lightweight Windows tool used to identify packers, protectors, and cryptors that authors use to obfuscate executables. It’s handy for reverse engineers, malware analysts, and security researchers who need a fast way to guess how a binary was packed or protected.Key features
- Fast signature-based detection of common packers/protectors.
- Simple, no-frills interface - great for quick checks.
- Helpful for pre-analysis to decide which tools or unpacking steps to use next.
- Works well alongside disassemblers and debuggers in a reverse-engineering workflow.
When to use PEiD
- As a first pass to identify whether a binary is packed.
- To pick the right unpacking or deobfuscation strategy.
- In lab environments for learning how different packers behave.
Quick tips
- Combine PEiD results with other tools (strings, YARA, diassembly) for better context.
- If PEiD reports “unknown,” manual inspection or dynamic analysis may reveal custom packers.
- Keep a local copy of signature updates if possible, but be aware PEiD v0.95 is older - pair it with modern tools.