You know what irritates me? Converting offsets to RVAs and VAs and back to offsets to be converted to VAs and oh my god kill me. That's what the PEEL project started out as: a wrapper that sat on top of Ero Carrera's pefile that eventually evolved into some sort of magical manipulation of Windows executables. Anyone who's dealt with PE files can tell you it's a sort of rite of passage once you actually get to the point where you think you understand what the hell is actually going on in that clusterfuck of a structure. As a result, PEEL lowers the bar-- or, at the very least, makes that clusterfuck more like spaghetti. (The kind with plenty of sauce, mind you.)
PEEL-- whose redundant definition stands for "PE Executable Library"-- is a python-based library for manipulating PE files. From rewriting DWORDs to import rebuilding to reconstructing a destroyed PE header to even creating your very own PE executable, PEEL is a highly flexible library. This presentation will introduce the audience to PEEL and offer examples of what it can accomplish.