mal_unpack

PE unpacker

A tool to unpack malicious code from packed executables using the PE-sieve technique.

Dynamic unpacker based on PE-sieve

GitHub

657 stars
29 watching
68 forks
Language: C
last commit: 9 months ago
Linked from 1 awesome list

libpeconvmalware-analysismalware-unpackermemory-forensicspe-sieve

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
hasherezade/libpeconv A library for loading and manipulating executable files (PE files) in a low-level way 1,117
hasherezade/bearparser A C++ library for parsing Portable Executable files 648
hasherezade/pe-bear-releases An open-source tool for analyzing and editing PE file formats 767
malwaremusings/unpacker Automated malware analysis tool 118
packing-box/pypackerdetect Detects whether an executable is packed using various methods and signatures. 21
yurisizuku/win-simpledpack A tool for packaging Windows executable files into a compressed format using LZMA compression and relocating shell code to an external DLL. 108
strazzere/android-unpacker A tool designed to reverse-engineer and analyze Android malware by unpacking and disassembling APK files 1,123
phra/pezor A tool for obfuscating and packing executable files to evade antivirus detection and security measures 1,856
hasherezade/transacted_hollowing An implementation of a memory-based PE injection technique for executing payloads in a target process 521
samlarenn/pepacker A tool for encrypting and obfuscating .text sections of executable files. 49
czs108/windows-pe-packer A tool that packs Windows executable files to make them harder to reverse-engineer 328
crackinglandia/fuu A GUI tool with plugins to unpack and decrypt software protected by various compression and encryption algorithms. 46
phat3/pindemonium An unpacker tool that uses the PIN technology to analyze and dissect Windows executables. 227
egebalci/amber Creates reflective PE files that can be executed in memory without being written to disk 1,187
kevoreilly/capev2 A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment. 2,011