A curated list of awesome resources related to executable packing
☆1,576Feb 14, 2026Updated 2 months ago
Alternatives and similar repositories for awesome-executable-packing
Users that are interested in awesome-executable-packing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Pin Tool for tracing API calls etc☆1,649Feb 8, 2026Updated 2 months ago
- Open-Source Shellcode & PE Packer☆2,094Feb 3, 2024Updated 2 years ago
- Dynamic unpacker based on PE-sieve☆809Apr 14, 2026Updated 2 weeks ago
- Automatic and platform-independent unpacker for Windows binaries based on emulation☆751Aug 18, 2025Updated 8 months ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆860Feb 2, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,933Apr 1, 2026Updated last month
- A tutorial on how to write a packer for Windows!☆311Dec 15, 2023Updated 2 years ago
- Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM.☆1,421Jun 11, 2022Updated 3 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,317Feb 15, 2026Updated 2 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,646Apr 18, 2026Updated 2 weeks ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,215Jun 17, 2022Updated 3 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆691Mar 11, 2024Updated 2 years ago
- 🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engine…☆358Oct 22, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆1,812Aug 30, 2024Updated last year
- Reflective PE packer.☆1,413Feb 22, 2024Updated 2 years ago
- Yet another variant of Process Hollowing☆465Jul 31, 2025Updated 9 months ago
- AV/EDR evasion via direct system calls.☆2,008Jan 1, 2023Updated 3 years ago
- Small and convenient C2 tool for Windows targets☆614Mar 8, 2022Updated 4 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆582Mar 8, 2024Updated 2 years ago
- Organized list of my malware development resources☆1,718Apr 1, 2026Updated last month
- Windows kernel and user mode emulation.☆1,949Apr 8, 2026Updated 3 weeks ago
- C/C++ source obfuscator for antivirus bypass☆1,067Mar 10, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆378May 24, 2022Updated 3 years ago
- x64 binary obfuscator☆1,967Jul 14, 2023Updated 2 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,352Apr 18, 2026Updated 2 weeks ago
- Converts PE into a shellcode☆2,760Aug 30, 2025Updated 8 months ago
- Some of my publicly available Malware analysis and Reverse engineering.☆950Jun 3, 2024Updated last year
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,548Feb 20, 2026Updated 2 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,349Apr 18, 2026Updated 2 weeks ago
- A modern 32/64-bit position independent implant template☆1,320Mar 21, 2025Updated last year
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,271Aug 27, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- awesome llvm security [Welcome to PR]☆827Updated this week
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,622Jul 31, 2024Updated last year
- State-of-the-art native debugging tools☆3,765Updated this week
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,519Nov 15, 2023Updated 2 years ago
- ☆780Oct 17, 2023Updated 2 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆552Dec 3, 2023Updated 2 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆759Nov 16, 2021Updated 4 years ago