Dynamic unpacker based on PE-sieve
☆813Apr 14, 2026Updated last month
Alternatives and similar repositories for mal_unpack
Users that are interested in mal_unpack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,665May 3, 2026Updated 2 weeks ago
- MalUnpack companion driver☆97Jun 17, 2024Updated last year
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,352Apr 18, 2026Updated last month
- A Pin Tool for tracing API calls etc☆1,657Feb 8, 2026Updated 3 months ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆862Feb 2, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆826Mar 16, 2024Updated 2 years ago
- Quickly debug shellcode extracted during malware analysis☆636May 23, 2023Updated 2 years ago
- Automatic and platform-independent unpacker for Windows binaries based on emulation☆753Aug 18, 2025Updated 9 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆586May 5, 2024Updated 2 years ago
- A more stealthy variant of "DLL hollowing"☆365Mar 8, 2024Updated 2 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Windows kernel and user mode emulation.☆1,967Updated this week
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,356Apr 18, 2026Updated last month
- Converts PE into a shellcode☆2,761Aug 30, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Converts a DLL into EXE☆816Jul 23, 2023Updated 2 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆694Mar 11, 2024Updated 2 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆4,025Updated this week
- A Binary Genetic Traits Lexer Framework☆583May 14, 2026Updated last week
- A dynamic VMP dumper and import fixer, powered by VTIL.☆1,358Nov 4, 2020Updated 5 years ago
- PE-bear (builds only)☆781Jun 4, 2023Updated 2 years ago
- A set of small utilities, helpers for PIN tracers☆40Feb 15, 2026Updated 3 months ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆584Mar 8, 2024Updated 2 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,038Jul 1, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆175May 11, 2026Updated last week
- Portable Executable reversing tool with a friendly GUI☆3,595Nov 2, 2025Updated 6 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆6,017Updated this week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,290May 11, 2026Updated last week
- Portable Executable parsing library (from PE-bear)☆657Oct 4, 2025Updated 7 months ago
- Malware Configuration And Payload Extraction☆3,193May 13, 2026Updated last week
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆647Aug 30, 2022Updated 3 years ago
- Open-Source Shellcode & PE Packer☆2,105Feb 3, 2024Updated 2 years ago
- Yet another variant of Process Hollowing☆468Jul 31, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,962Apr 1, 2026Updated last month
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,558Feb 20, 2026Updated 3 months ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆120Apr 8, 2023Updated 3 years ago
- AV/EDR evasion via direct system calls.☆1,811Sep 3, 2022Updated 3 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆952Jun 3, 2024Updated last year
- A curated list of awesome resources related to executable packing☆1,576Feb 14, 2026Updated 3 months ago