A curated list of awesome resources related to executable packing
☆1,559Feb 14, 2026Updated last month
Alternatives and similar repositories for awesome-executable-packing
Users that are interested in awesome-executable-packing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Pin Tool for tracing API calls etc☆1,641Feb 8, 2026Updated 2 months ago
- Open-Source Shellcode & PE Packer☆2,086Feb 3, 2024Updated 2 years ago
- Dynamic unpacker based on PE-sieve☆803Apr 1, 2026Updated last week
- Automatic and platform-independent unpacker for Windows binaries based on emulation☆747Aug 18, 2025Updated 7 months ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆858Feb 2, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,905Apr 1, 2026Updated last week
- A tutorial on how to write a packer for Windows!☆311Dec 15, 2023Updated 2 years ago
- Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM.☆1,410Jun 11, 2022Updated 3 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,606Updated this week
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,295Feb 15, 2026Updated last month
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,207Jun 17, 2022Updated 3 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆688Mar 11, 2024Updated 2 years ago
- Reflective PE packer.☆1,408Feb 22, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆1,803Aug 30, 2024Updated last year
- 🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engine…☆356Oct 22, 2024Updated last year
- Yet another variant of Process Hollowing☆461Jul 31, 2025Updated 8 months ago
- AV/EDR evasion via direct system calls.☆2,001Jan 1, 2023Updated 3 years ago
- Small and convenient C2 tool for Windows targets☆615Mar 8, 2022Updated 4 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Mar 8, 2024Updated 2 years ago
- Organized list of my malware development resources☆1,706Apr 1, 2026Updated last week
- C/C++ source obfuscator for antivirus bypass☆1,066Mar 10, 2022Updated 4 years ago
- Windows kernel and user mode emulation.☆1,933Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆378May 24, 2022Updated 3 years ago
- x64 binary obfuscator☆1,962Jul 14, 2023Updated 2 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,345Apr 1, 2026Updated last week
- Converts PE into a shellcode☆2,751Aug 30, 2025Updated 7 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,334Updated this week
- Some of my publicly available Malware analysis and Reverse engineering.☆943Jun 3, 2024Updated last year
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,541Feb 20, 2026Updated last month
- A modern 32/64-bit position independent implant template☆1,313Mar 21, 2025Updated last year
- SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature…☆1,265Aug 27, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,610Jul 31, 2024Updated last year
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,513Nov 15, 2023Updated 2 years ago
- State-of-the-art native debugging tools☆3,712Updated this week
- ☆779Oct 17, 2023Updated 2 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆759Nov 16, 2021Updated 4 years ago
- awesome llvm security [Welcome to PR]☆805Apr 1, 2026Updated last week
- KaynLdr is a Reflective Loader written in C/ASM☆552Dec 3, 2023Updated 2 years ago