fuu
Pack unpacker
A GUI tool with plugins to unpack and decrypt software protected by various compression and encryption algorithms.
[F]aster [U]niversal [U]npacker
46 stars
5 watching
18 forks
Language: C++
last commit: over 11 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
hatching/sflock | A utility for staging and detoning binary samples, compatible with various archive formats. | 83 |
zhuangsirui/binpacker | A tool that packs and unpacks binary data in a compact format | 220 |
uchihal/appspear | An Android unpacking system capable of automating the extraction of packed applications from various packers. | 42 |
hasherezade/mal_unpack | A tool to unpack malicious code from packed executables using the PE-sieve technique. | 657 |
mitsuhiko/unp | A command line tool for unpacking various types of archives and files | 424 |
strazzere/android-unpacker | A tool designed to reverse-engineer and analyze Android malware by unpacking and disassembling APK files | 1,123 |
iphelix/pack | A toolkit for analyzing and improving password cracking operations by identifying common patterns in leaked passwords. | 796 |
unknow101/fuckthatpacker | A tool to bypass Windows Defender by packing payloads and integrating with CobaltStrike | 628 |
friedkiwi/netcrypt | A .NET executable packer providing runtime packing for .NET executables without native code usage | 58 |
unipacker/unipacker | An automatic unpacker for Windows binaries using emulation. | 654 |
phat3/pindemonium | An unpacker tool that uses the PIN technology to analyze and dissect Windows executables. | 227 |
floyd-fuh/jks-private-key-cracker-hashcat | A tool that exploits vulnerabilities in the password protection of Java Key Stores to crack private key passwords, | 184 |
openwall/johnny | A GUI frontend for password cracking and management using John the Ripper | 534 |
malwaremusings/unpacker | Automated malware analysis tool | 118 |
henshin/filebuster | A fast and flexible web application testing tool that uses brute-force methods to discover vulnerabilities | 212 |