mal_unpack

PE unpacker

A tool to unpack malicious code from packed executables using the PE-sieve technique.

Dynamic unpacker based on PE-sieve

GitHub

668 stars
29 watching
69 forks
Language: C
last commit: 11 months ago
Linked from 1 awesome list

libpeconvmalware-analysismalware-unpackermemory-forensicspe-sieve

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
hasherezade/libpeconv A C++ library that provides a set of helper functions for loading, manipulating, and dumping PE files. 1,129
hasherezade/bearparser A C++ library for parsing Portable Executable files 647
hasherezade/pe-bear-releases An open-source tool for analyzing and editing PE file formats 772
malwaremusings/unpacker Automated malware analysis tool 118
packing-box/pypackerdetect Detects whether an executable is packed using various methods and signatures. 21
yurisizuku/win-simpledpack A tool for packaging Windows executable files into a compressed format using LZMA compression and relocating shell code to an external DLL. 110
strazzere/android-unpacker A tool designed to reverse-engineer and analyze Android malware by unpacking and disassembling APK files 1,129
phra/pezor A tool for obfuscating and packing executable files to evade antivirus detection and security measures 1,869
hasherezade/transacted_hollowing An implementation of a memory-based PE injection technique for executing payloads in a target process 521
samlarenn/pepacker A tool for encrypting and obfuscating .text sections of executable files. 49
czs108/windows-pe-packer A tool that packs Windows executable files to make them harder to reverse-engineer 330
crackinglandia/fuu A GUI tool with plugins to unpack and decrypt software protected by various compression and encryption algorithms. 46
phat3/pindemonium An unpacker tool that uses the PIN technology to analyze and dissect Windows executables. 229
egebalci/amber Creates reflective PE files that can be executed in memory without being written to disk 1,208
kevoreilly/capev2 A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment. 2,043