Windows-PE-Packer
File packer
A tool that packs Windows executable files to make them harder to reverse-engineer
🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engineering.
330 stars
19 watching
50 forks
Language: C
last commit: 4 months ago
Linked from 1 awesome list
pereverse-engineeringsecuritywindows
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool for packaging Windows executable files into a compressed format using LZMA compression and relocating shell code to an external DLL. | 110 |
| A tool for compressing and decompressing PE32 executables using aPLib compression library | 10 |
| A tool for compressing and modifying executable files on Windows. | 46 |
| A tool for creating Windows PE files with dynamic compression and file mapping. | 52 |
| A tool that reduces the size of executables and provides basic protection to prevent reverse-engineering | 43 |
| A tool to bypass Windows Defender by packing payloads and integrating with CobaltStrike | 630 |
| A tool for compressing and encrypting Portable Executable files using Huffman compression and XOR encryption. | 57 |
| Detects whether an executable is packed using various methods and signatures. | 21 |
| A compression format designed for efficient decompression on 8-bit microcomputers. | 237 |
| A .NET executable packer designed to provide a basic understanding of runtime packing and compression | 59 |
| A tool for analyzing and disassembling PE files with additional features for parsing and extracting data | 42 |
| Writing a simple PE Packer in detail to understand its inner workings and techniques | 15 |
| A tool to unpack malicious code from packed executables using the PE-sieve technique. | 668 |
| A tool that encrypts and decrypts .NET executables using a simple XOR cipher | 14 |