Executable Packing
Documentation
78_ENTRIESScientific Research
288_ENTRIES- Adaptive unpacking of Android Apps
(May 2017)
- Anti-unpacker tricks
(May 2008)
- Automated static analysis of virtual-machine packers
(August 2013)
- Automatic static unpacking of malware binaries
(October 2009)
- Binary-code obfuscations in prevalent packer tools
(October 2013)
- BinStat tool for recognition of packed executables
(September 2010)
- Building a malware mutation tool
(June 2024)
- Classifying packed programs as malicious software detected
(December 2016)
- A close look at a daily dataset of malware samples
(January 2019)
- Collective classification for packed executable identification
(September 2011)
- Dealing with virtualization packers
(May 2008)
- Denial-of-service attacks on host-based generic unpackers
(December 2009)
- Detecting packed executables using steganalysis
(December 2014)
- Detecting traditional packers, decisively
(October 2013)
- Detection of packed malware
(August 2012)
- Efficient automatic original entry point detection
(January 2019)
- ESCAPE: Entropy score analysis of packed executable
(October 2012)
- Eureka: A framework for enabling static malware analysis
(October 2008)
- Evading machine learning malware detection
(July 2017)
- A fast randomness test that preserves local detail
(October 2008)
- Generic unpacker of executable files
(April 2015)
- Generic unpacking techniques
(February 2009)
- Generic unpacking using entropy analysis
(October 2010)
- Intriguing properties of neural networks
(February 2014)
- Limits of static analysis for malware detection
(December 2007)
- Mal-EVE: Static detection model for evasive malware
(August 2015)
- Mal-xtract: Hidden code extraction using memory analysis
(January 2017)
- Malware analysis using visualized images and entropy graphs
(February 2015)
- Malware obfuscation techniques: A brief survey
(November 2010)
- MetaAware: Identifying metamorphic malware
(December 2007)
- Modern linux malware exposed
(June 2018)
- Obfuscation: The hidden malware
(August 2011)
- OmniUnpack: Fast, generic, and safe unpacking of malware
(December 2007)
- On evaluating adversarial robustness
(February 2019)
- On the (Im)possibility of obfuscating programs
(August 2001)
- Opcodes as predictor for malware
(January 2008)
- Packed PE file detection for malware forensics
(December 2009)
- Packer classifier based on PE header information
(April 2015)
- Packer identification based on metadata signature
(December 2017)
- Packer identification method based on byte sequences
(November 2018)
- Packer identification using byte plot and Markov plot
(September 2015)
- Packer identification using hidden Markov model
(November 2017)
- Packer-complexity analysis in PANDA
(January 2018)
- Pandora's Bochs: Automatic unpacking of malware
(January 2008)
- PE file features in detection of packed executables
(January 2012)
- PEAL - Packed executable analysis
(January 2012)
- PEzoNG: Advanced packer for automated evasion on Windows
(December 2022)
- Pitfalls in machine learning for computer security
(October 2024)
- Qualitative and quantitative evaluation of software packers
(December 2015)
- Renovo: A hidden code extractor for packed executables
(November 2007)
- Revealing packed malware
(September 2008)
- Robust static analysis of portable executable malware
(December 2014)
- Runtime packers testing experiences
(May 2008)
- SATURN - Software deobfuscation framework based on LLVM
(November 2019)
- Semi-supervised learning for packed executable detection
(September 2011)
- Source-free binary mutation for offense and defense
(December 2014)
- SPADE: Signature based packer detection
(August 2012)
- Standards and policies on packer use
(October 2010)
- A study of the packer problem and its solutions
(September 2008)
- A survey on adversarial attacks for malware analysis
(January 2022)
- A survey on run-time packers and mitigation techniques
(November 2023)
- Symbolic execution of obfuscated code
(October 2015)
- Thwarting real-time dynamic unpacking
(January 2011)
- Understanding linux malware
(May 2018)
- Unknown malcode detection using OPCODE representation
(December 2008)
- A unpacking and reconstruction system-agunpacker
(January 2009)
- Unpacking techniques and tools in malware analysis
(September 2012)
- Unpacking virtualization obfuscators
(August 2009)
- WYSINWYX: What you see is not what you execute
(August 2010)
Datasets
36_ENTRIES- BODMAS
Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware.
- Contagio
Contagio is a collection of the latest malware samples, threats, observations, and analyses.
- CyberCrime
C² tracking and malware database.
- Dataset of Packed ELF
Dataset of packed ELF samples.
- Dataset of Packed PE
Sanitized version of the original dataset, PackingData, removing packed samples from the Notpacked folder but also samples in packer folders that failed to be packed (having a same hash as the original unpacked executable).
- Ember
Collection of features from PE files that serve as a benchmark dataset for researchers.
- FFRI Dataset Scripts
Make datasets like FFRI Dataset.
- MaleX
Curated dataset of malware and benign Windows executable samples for malware researchers containing 1,044,394 Windows executable binaries and corresponding image representations with 864,669 labelled as malware and 179,725 as benign.
- Malfease
Dataset of about 5,000 packed malware samples.
- Malheur
Contains the recorded behavior of malicious software (malware) and has been used for developing methods for classifying and clustering malware behavior (see the JCS article from 2011).
- Malicia
Dataset of 11,688 malicous PE files collected from 500 drive-by download servers over a period of 11 months in 2013 (DISCONTINUED).
- MalShare
Free Malware repository providing researchers access to samples, malicious feeds, and Yara results.
- Malware Archive
Malware samples, analysis exercises and other interesting resources.
- The Malware Museum
The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers.
- MalwareBazaar
Project operated by abuse.ch aimed to collect and share malware samples, helping IT-security researchers and threat analysts protecting their constituency and customers from cyber threats.
- MalwareGallery
Yet another malware collection in the Internet.
- MalwareSamples
Bringing you the best of the worst files on the Internet.
- MalwareTips
MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats.
- OARC Malware Dataset
Semi-public dataset of 3,467 samples captured in the wild from Sep 2005 to Jan 2006 by mail traps, user submissions, honeypots and other sources aggregated by the OARC, available to qualified academic and industry researchers upon request.
- Open Malware Project
Online collection of malware samples (formerly Offensive Computing).
- PackingData
Original dataset with sample PE files packed with a large variety of packers, including ASPack, BeRoEXEPacker, exe32pack, eXpressor, FSG, JDPack, MEW, Molebox, MPRESS, Neolite, NSPack, Pckman, PECompact, PEtite, RLPack, UPX, WinUpack, Yoda's Crypter and Yoda's Protector.
- Packware
Datasets and codes that are needed to reproduce the experiments in the paper "When Malware is Packing Heat".
- RCE Lab
Crackme's, keygenme's, serialme's ; the "tuts4you" folder contains many packed binaries.
- Runtime Packers Testset
Dataset of 10 common Malware files, packed with about 40 different runtime packers in over 500 versions and options, with a total of about 5,000 samples.
- SAC
Slovak Antivirus Center, non-commercial project of AVIR and ESET companies ; contains packers, detectors and unpackers.
- SOREL
Sophos-ReversingLabs 20 Million dataset.
- theZoo
Project created to make the possibility of malware analysis open and available to the public.
- ViruSign
Another online malware database.
- VirusSamples
Best of the worst kind of files on the Internet.
- VirusShare
Virus online database with more than 44 millions of samples.
- VirusSign
Giant database dedicated to combating malware in the digital world.
- VirusTotal
File analysis Web service for detecting malware.
- VX Heaven
Site dedicated to providing information about computer viruses.
- VX Underground
PL-CERT based open source MWDB python application holding a malware database containing every APT sample from 2010 and over 7.5M maliciousbinaries.
- VXvault
Online malware database.
- WildList
Cooperative listing of malwares reported as being in the wild by security professionals.
After 2010
77_ENTRIES- NPack - Can compress 32bits and 64bits exe, dll, ocx, scr Windows program.
- Alienyze
Advanced software protection and security for Windows 32-bit executables.
- Alternate EXE Packer
Compression tool for executable files (type EXE) or DLL's relying on UPX 3.96.
- Amber
Position-independent(reflective) PE loader that enables in-memory execution of native PE files(EXE, DLL, SYS).
- Andromeda
Custom packer used in malware campaigns using RunPE techniques for evading AV mitigation methods.
- APKProtect
APK encryption and shell protection supporting Java and C++.
- Armadillo
Incorporates both a license manager and wrapper system for protecting PE files.
- ASM Guard
Packer utility for compressing and complicating reversing compiled native code (native files), protecting resources, adding DRM, and packing into an optimized loader.
- ASPack
Advanced solution created to provide Win32 EXE file packing and to protect them against non-professional reverse engineering.
- ASProtect 32
Multifunctional EXE packing tool designed for software developers to protect 32-bit applications with in-built application copy protection system.
- ASProtect 64
Tool for protecting 64-bit applications and .NET applications for Windows against unauthorized use, industrial and home copying, professional hacking and analysis of software products distributed over the Internet and on any physical media.
- Astral-PE
Low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64).
- AutoIT
Legitimate executable encryption service.
- AxProtector
Encrypts the complete software you aim to protect, and shields it with a security shell, AxEngine, best-of-breed anti-debugging and anti-disassembly methods are then injected into your software.
- BangCle
Protection tool using the second generation Android Hardening Protection, loading the encrypted DEX file from memory dynamically.
- Bero
Bero EXE Packer (BEP) for 32-bit windows executables.
- BIN-crypter
EXE protection software against crackers and decompilers.
- Code Virtualizer
Code Virtualizer is a powerful code obfuscation system for Windows, Linux and macOS applications that helps developers to protect their sensitive code areas against Reverse Engineering with very strong obfuscation code, based on code virtualization.
- ConfuserEx
An open-source, free protector for .NET applications.
- Crinkler
Compressing linker for Windows, specifically targeted towards executables with a size of just a few kilobytes.
- DarkCrypt
Simply and powerful plugin for Total Commander used for file encryption using 100 algorithms and 5 modes.
- DexGuard
Android app obfuscation & security protocols for mobile app protection.
- DexProtector
Multi-layered RASP solution that secures your Android and iOS apps against static and dynamic analysis, illegal use and tampering.
- DotBundle
GUI tool to compress, encrypt ad password-protect a .NET application or embed .NET libraries.
- DotNetZ
Straightforward and lightweight, command-line piece of software written in C that allows you to compress and pack Microsoft .NET Framework executable files.
- ElecKey
Suite of software and tools that offer a complete solution for software protection, copy protection, and license management.
- ELF Packer
Encrypts 64-bit elf files that decrypt at runtime.
- ELFCrypt
Simple ELF crypter using RC4 encryption.
- ELFuck
ELF packer for i386 original version from sk2 by sd.
- Enigma Protector
Professional system for executable files licensing and protection.
- Enigma Virtual Box
Application virtualization system for Windows.
- Eronona-Packer
This is a packer for exe under win32.
- EXE Bundle
Bundles application files into a single PE32 file.
- EXE Stealth
Anti-cracking protection and licensing tool for PE files featuring compression and encryption polymorphic technology.
- Ezuri
A Simple Linux ELF Runtime Crypter.
- GzExe
Utility that allows to compress executables as a shell script.
- hXOR-Packer
PE packer with Huffman compression and XOR encryption.
- LIAPP
Easiest and most powerful mobile app security solution.
- LM-X License Manager
LM-X License Manager lets you protect your products against piracy by enforcing various levels of security, save time, and reduce business risks.
- m0dern_p4cker
Just a modern packer for elf binaries ( works on linux executables only ).
- MidgetPack
Midgetpack is a binary packer for ELF binaries, such as burneye, upx or other tools.
- MPRESS
Compresses (using LZMA) and protects PE, .NET or Mach-O programs against reverse engineering.
- NetCrypt
A proof-of-concept packer for .NET executables, designed to provide a starting point to explain the basic principles of runtime packing.
- .netshrink
Executable compressor for your Windows or Linux .NET application executable file using LZMA.
- Obsidium
Feature-rich professional software protection and licensing system designed as a cost effective and easy to implement, yet reliable and non-invasive way to protect your 32- and 64-bit Windows software applications and games from reverse engineering.
- Origami
Packer compressing .net assemblies, (ab)using the PE format for data storage.
- OS-X_Packer
Binary packer for the Mach-O file format.
- Pakkero
Pakkero is a binary packer written in Go made for fun and educational purpose.
- Pakr
In-memory packer for macOS Mach-O bundles.
- Papaw
Permissively-licensed packer for ELF executables using LZMA Zstandard or Deflate compression.
- PE-Packer
Simple packer for Windows 32-bits PE files.
- PE-Toy
A PE file packer.
- PELock
Software protection system for Windows executable files ; protects your applications from tampering and reverse engineering, and provides extensive support for software license key management, including support for time trial periods.
- PePacker
Simple PE Packer Which Encrypts .text Section I release a simple PE file packer which encrypts the .text section and adds a decryption stub to the end of the last section.
- PEShield
PE-SHiELD is a program, which encrypts 32-bit Windows EXE files, leaving them still executable.
- PEtite
Free Win32 (Windows 95/98/2000/NT/XP/Vista/7/etc) executable (EXE/DLL/etc) compressor.
- PEzoNG
Framework for automatically creating stealth binaries that target a very low detection rate in a Windows environment.
- PEzor
Open-Source Shellcode & PE Packer.
- ProtectMyTooling
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry.
- RapidEXE
Simple and efficient way to convert a PHP/Python script to a standalone executable.
- Silent-Packer
Silent Packer is an ELF / PE packer written in pure C.
- Simple-PE32-Packer
Simple PE32 Packer with aPLib compression library.
- SimpleDPack
A very simple windows EXE packing tool for learning or investigating PE structure.
- Smart Packer
Packs 32 & 64bit applications with DLLs, data files, 3rd party run-time into one single executable that runs instantly, with no installs or hassles.
- Squishy
Modern packer developed for 64kb demoscene productions, targets 32bit and 64bit executables.
- theArk
Windows x86 PE Packer In C++.
- Themida
From Renovo paper: Themida converts the original x86 instructions into virtual instructions in its own randomized instruction set, and then interpret these virtual instructions at run-time.
- UPX
Ultimate Packer for eXecutables.
- VirtualMachineObfuscationPoC
Obfuscation method using virtual machine.
- VMProtect
VMProtect protects code by executing it on a virtual machine with non-standard architecture that makes it extremely difficult to analyze and crack the software.
- Ward
Simple implementation of an ELF packer that creates stealthy droppers for loading malicious ELFs in-memory.
- Woody Wood Packer
ELF packer - encrypt and inject self-decryption code into executable ELF binary target.
- xorPacker
Simple packer working with all PE files which cipher your exe with a XOR implementation.
- zELF
A modular ELF64 packer for Linux x86_64 featuring 22 compression codecs, ML-based codec selection, and support for both static and PIE binaries.
- ZProtect
Renames metadata entities and supports advanced obfuscation methods that harden protection scheme and foil reverse engineering altogether.
Between 2000 and 2010
40_ENTRIES- 20to4
Executable compressor that is able to stuff about 20k of finest code and data into less than 4k.
- ACProtect
Application that allows to protect Windows executable files against piracy, using RSA to create and verify the registration keys and unlock code.
- AHPack
PE and PE+ file packer.
- Application Protector
Tool for protecting Windows applications.
- AT4RE Protector
Very simple PE files protector programmed in ASM.
- AverCryptor
Small and very handy utility designed to encrypt notes in which you can store any private information - it helps to hide your infection from antiviruses.
- BurnEye
Burneye ELF encryption program, x86-linux binary.
- ByteBoozer
Commodore 64 executable packer.
- CryptExec
Next-generation runtime binary encryption using on-demand function extraction.
- EXE Guarder
Licensing tool for PE files allowing to compress and specify a password notice.
- EXE Wrapper
Protects any EXE file with a password from non-authorized execution.
- Exe32Pack
Compresses Win32 EXEs, DLLs, etc and dynamically expands them upon execution.
- EXECryptor
Protects EXE programs from reverse engineering, analysis, modifications and cracking.
- ExeFog
Simple Win32 PE files packer.
- eXPressor
Used as a compressor this tool can compress EXE files to half their normal size.
- FSG
Fast Small Good, perfect compressor for small exes, eg.
- GHF Protector
Executable packer / protector based on open source engines Morphine and AHPack.
- HackStop
EXE and COM programs encrypter and protector.
- Kkrunchy
Kkrunchy is a small exe packer primarily meant for 64k intros.
- Laturi
Linker and compressor intended to be used for macOS 1k, 4k and perhaps 64K intros.
- mPack
mPack - mario PACKersimple Win32 PE Executable compressor.
- NSPack
32/64-bits exe, dll, ocx, scr Windows program compressor.
- NTPacker
PE file packer relying on aPlib for compression and/or XOR for encryption.
- PECompact
Windows executable compressor featuring third-party plug-ins offering protection against reverse engineering.
- RDMC
DMC algorithm based packer.
- RLPack
Compresses your executables and dynamic link libraries in a way that keeps them small and has no effect on compressed file functionality.
- RSCC
ROSE Super COM Crypt ; polymorph cryptor for files greater than 300-400B and smaller than 60kB.
- RUCC
ROSE Ultra COM Compressor ; COM and EXE compression utility based on 624.
- Sentinel HASP Envelope
Wrapping application that protects the target application with a secure shield, providing a means to counteract reverse engineering and other anti-debugging measures.
- sePACKER
Simple Executable Packer is compressing executables' code section inorder to decrease size of binary files.
- Shiva
Shiva is a tool to encrypt ELF executables under Linux.
- tElock
Telock is a practical tool that intends to help developers who want to protect their work and reduce the size of the executable files.
- TTProtect
Professional protection tool designed for software developers to protect their PE applications against illegal modification or decompilation.
- UPack
Compresses Windows PE file.
- UPX-Scrambler
Scrambler for files packed with UPX (up to 1.06) so that they cannot be unpacked with the '-d' option.
- WinUpack
Graphical interface for Upack, a command-line program used to create self-extracting archives from Windows PE files.
- x86.Virtualizer
x86 Virtualizer.
- XComp
PE32 image file packer and rebuilder.
- Yoda Crypter
Supports polymorphic encryption, softice detection, anti-debug API's, anti-dumping, etc, encrypts the Import Table and erases PE Header.
- Yoda Protector
Free, open source, Windows 32-bit software protector.
Before 2000
59_ENTRIES- VGCrypt - PE crypter for Win95/98/NT.
- 32Lite
Compression tool for executable files created with Watcom C/C++ compiler.
- 624
COM packer that can compress COM programs shorter than 25000 bytes.
- ABK Scrambler
COM file scrambler and protector recoded from ABKprot.
- AEP
Addition Encode-Protective for COM and EXE file.
- AINEXE
DOS executable packer (part of the AIN Archiver suite).
- aPack
16-bit real-mode DOS executable ( .EXE and .COM ) compressor.
- AVPack
Encrypts EXE or COM files so that they'll be able to start on your PC only.
- AXE
Program compression utility.
- BIN-Lock
COM file scrambler for preventing reverse engineering.
- BitLok
COM and EXE file protector.
- C0NtRiVER
COM file encryptor.
- CauseWay Compressor
DOS EXE compressor.
- CC Pro
COM and EXE executable file compression utility.
- CEXE
Compresses an input EXE into a smaller executable (only runs on WinNT, Win2000 and above - won't run on Win95 or Win98).
- COMProtector
Adds a security envelope around DOS .COM files by randomly encrypting it and adding several anti-debugging tricks.
- CrackStop
Tool that creates a security envelope around a DOS EXE file to protect it against crackers.
- Crunch
File encryptor for COM and EXE files.
- EPack
EXE and COM file compressor ; works with DOS/Windows95 files.
- ExeGuard
DOS EXE files free protector using anti-debugging ticks to prevent hacking, analysis and unpacking.
- EXELOCK 666
Utility for protecting .EXE files so no lamers can hack out the copyright.
- FSE
Final Fantasy Security Envelope freeware for protecting COM and EXE progams.
- Gardian Angel
COM and EXE encrypter and protector using a variety of anti-debugging tricks.
- JMCryptExe
DOS EXE encrypter.
- LGLZ
DOS EXE and COM file compressor using modified LZ77.
- LzExe
MS-DOS executable file compressor.
- Mask
Tool that prevents COM program from being cracked by using encryption and anti-debugging tricks.
- Megalite
MS-DOS executable file compressor.
- Mess
This tool does the same as HackStop, with the exception that it is freeware for non-commercial use.
- Morphine
Application for PE files encryption.
- Neolite
Compresses Windows 32-bit EXE files and DLLs.
- PACK
Executable files compressor.
- PCShrink
Windows 9x/NT executable file compressor relying on the aPLib compression library.
- PE Diminisher
Simple PE packer relying on the aPLib compression library.
- PE-Protector
Encrypter/protector for Windows 9x/ME to protect executable files PEagainst reverse engineering or cracking with a very strong protection.
- PEBundle
Physically attaches DLL(s) to an executable, resolving dependencies in memory.
- PEPack
PE compression tool based on the code of a newer version of PE-SHiELD.
- PKlite
Easy-to-use file compression program for compressing DOS and Windows executable files.
- Pro-Pack
DOS executable file compressor.
- RERP
ROSE's EXE Relocation Packer.
- RJCrush
EXE and COM files compressor with the ability to compress overlays.
- Scorpion
EXE and COM file encrypter and protector.
- SecuPack
Win32 executable compressor.
- Shrinker
Compresses (up to 70%) 16 and 32 bit Windows and real mode DOS programs.
- $PIRIT
COM/EXE executable files polymorphic encryptor.
- SysPack
Device drivers compressor.
- T-Pack
Executable COM-FILE compressor (LZ77) optimized for small files like BBS-Addys or similar files.
- TinyProg
EXE and COM programs compressor.
- TRAP
EXE and COM files encrypter and protector.
- Vacuum
Runtime Compressor for DOS32 executables.
- WinLite
Compresses Windows executables (such as Pklite, Diet or Wwpack) for executables programs under DOS.
- WWPack
Squeezes EXE files, compresses relocation tables, optimizes headers, protects EXE files from hacking.
- XE
PE32 image file packer and rebuilder.
- XorCopy
COM file XOR-based encrypter.
- XORER
COM file XOR-based encrypter.
- XPA
DOS executable packer.
- XPack
EXE/COM/SYS executable file compressor.
Tools
115_ENTRIES- Lissom - Retargetable decompiler consisting of a preprocessing part and a decompilation core.
- Android Unpacker
Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0.
- Angr
Platform-agnostic binary analysis framework.
- APKiD
Android application Identifier for packers, protectors, obfuscators and oddities - PEiD for Android.
- aPLib
Compression library based on the algorithm used in aPACK.
- AppSpear
Universal and automated unpacking system suitable for both Dalvik and ART.
- Assiste (Packer)
Assiste.com's example list of packers.
- AVClass
Python tools to tag / label malware samples.
- Bintropy
Prototype analysis tool that estimates the likelihood that a binary file contains compressed or encrypted bytes.
- BinUnpack
Unpacking approach free from tedious memory access monitoring, therefore introducing very small runtime overhead.
- Binutils
The GNU Binutils are a collection of binary tools for Linux (it namely includes Readelf).
- BitBlaze
Analysis platform that features a novel fusion of static and dynamic analysis techniques, mixed concrete and symbolic execution, and whole-system emulation and binary instrumentation, all to facilitate state-of-the art research on real security problems.
- Capa
Open-source tool to identify capabilities in PE, ELF or .NET executable files.
- Capstone
Lightweight multi-platform, multi-architecture disassembly framework.
- Cave-Finder
Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files.
- CFF Explorer
PE32/64 and .NET editor, part of the Explorer Suite.
- ChkEXE
Identifies almost any EXE/COM packer, crypter or protector.
- Clamscan Unpacker
Unpacker derived from ClamAV.
- COM2EXE
Free tool for converting COM files to EXE format.
- de4dot
.NET deobfuscator and unpacker.
- de4js
JavaScript Deobfuscator and Unpacker.
- Defacto2 Analyzers Archive
Collection of 60 binary files analysers for MS-DOS and Windows32 from the 1990s and the 2000s.
- Defacto2 Packers Archive
Collection of 460 binary and data file packers for MS-DOS and Windows32 from the 1990s and 2000s.
- Defacto2 Unpackers Archive
Collection of 152 binary files unpackers for MS-DOS and Windows 32 from the 1990s and 2000s.
- DIE
Detect It Easy ; Program for determining types of files.
- DSFF
DataSet File Format for exchanging datasets and converting to ARFF (for use with Weka), CSV or Packing-Box's dataset structure.
- DynamoRIO
Runtime code manipulation system that supports code transformations on any part of a program, while it executes.
- Emulator
Symantec Endpoint Protector (from v14) capability to create a virtual machine on the fly to identify, detonate, and eliminate malware hiding inside custom malware packers.
- EtherUnpack
Precision universal automated unpacker (successor of PolyUnpack).
- Eureka
Binary static analysis preparation framework implementing a novel binary unpacking strategy based on statistical bigram analysis and coarse-grained execution tracing.
- EXEInfo-PE
Fast detector for executable PE files.
- ExeScan
Executable file analyzer which detects the most famous EXE/COM Protectors, Packers, Converters and compilers.
- EXETools
Forum for reverse engineering and executale packing related topics.
- FUU
Fast Universal Unpacker.
- GetTyp
File format detection program for DOS based on special strings and byte code.
- GUnpacker
Shell tool that performs OEP positioning and dumps decrypted code.
- Gym-Malware
This is a malware manipulation environment for OpenAI's gym.
- IDR
Interactive Delphi Reconstructor.
- ImpREC
This can be used to repair the import table for packed programs.
- Justin
Just-In-Time AV scanning ; generic unpacking solution.
- Language 2000
Ultimate compiler detection utility.
- LIEF
Library to Instrument Executable Formats ; Python package for parsing PE, ELF, Mach-O and DEX formats, modifying and rebuilding executables.
- LordPE
PE header viewer, editor and rebuilder.
- Malheur
Tool for the automatic analysis of malware behavior (recorded from malicious software in a sandbox environment).
- MalUnpack
Dynamic unpacker based on PE-sieve.
- Manalyze
Robust parser for PE files with a flexible plugin architecture which allows users to statically analyze files in-depth.
- MRC
(Mandiant Red Curtain) Free software for Incident Responders that assists with the analysis of malware ; it examines executable files (e.g., .exe, .dll, and so on) to determine how suspicious they are based on a set of criteria.
- .NET Deobfuscator
List of .NET Deobfuscators and Unpackers.
- NotPacked++
Attack tool for altering packed samples so that they evade static packing detection.
- Oedipus
A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.
- OEPdet
Automated original-entry-point detector.
- OllyDbg Scripts
Collection of OllyDbg scripts for unpacking many different packers.
- OmniUnpack
New technique for fast, generic, and safe unpacking of malware by monitoring the execution in real-time and detecting the removed layers of packing.
- PackerAttacker
Tool that uses memory and code hooks to detect packers.
- PackerBreaker
Tool for helping unpack, decompress and decrypt most of the programs packed, compressed or encrypted using advanced emulation technology.
- PackerGrind
Adaptive unpacking tool for tracking packing bahaviors and unpacking Android packed apps.
- PackerID
Fork of packerid.py using PEid signatures and featuring additional output types, formats, digital signature extraction, and disassembly support.
- PackID
Packer identification multiplatform tool/library using the same database syntax as PEiD.
- Packing-Box
Docker image gathering many packing-related tools and for making datasets of packed executables for use with machine learning.
- PANDA
Platform for Architecture-Neutral Dynamic Analysis.
- Pandora's Bochs
Extension to the Bochs PC eumlator to enable it to monitor execution of the unpacking stubs for extracting the original code.
- PCjs
PCjs uses JavaScript to recreate the IBM PC experience, using original ROMs, CPUs running at their original speeds, and early IBM video cards and monitors.
- PE Compression Test
List of packers tested on a few sample executables for comparing compressed sizes.
- PE Detective
This GUI tool can scan single PE files or entire directories (also recursevely) and generate complete reports.
- PE-bear
Freeware reversing tool for PE files aimed to deliver fast and flexible “first view” for malware analysts, stable and capable to handle malformed PE files.
- PEdump
Dump windows PE files using Ruby.
- Pefeats
Utility for extracting 119 features from a PE file for use with machine learning algorithms.
- Pefile
Multi-platform Python module to parse and work with Portable Executable files.
- PEFrame
Tool for performing static analysis on PE malware and generic suspicious files.
- PEiD
Packed Executable iDentifier.
- PEiD (CLI)
Python implementation of PEiD featuring an additional tool for making new signatures.
- PEiD (yara)
Yet another implementation of PEiD with yara.
- PeLib
PE file manipulation library.
- PEPack
PE file packer detection tool, part of the Unix package "pev".
- PEscan
CLI tool to scan PE files to identify how they were constructed.
- PETools
Old-school reverse engineering tool (with a long history since 2002) for manipulating PE files.
- PEview
Provides a quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files.
- PExplorer
Most feature-packed program for inspecting the inner workings of your own software, and more importantly, third party Windows applications and libraries for which you do not have source code.
- Pin
Dynamic binary instrumentation framework for the IA-32, x86-64 and MIC instruction-set architectures that enables the creation of dynamic program analysis tools.
- PINdemonium
Unpacker for PE files exploiting the capabilities of PIN.
- PolyUnpack
Implemention attempt of the general approach for extracting the original hidden code of PE files without any heuristic assumptions.
- PortEx
Java library for static malware analysis of PE files with a focus on PE malformation robustness and anomaly detection.
- PROTECTiON iD
PE file signature-based scanner.
- ProTools
Programmer's Tools, a web site dedicated for all kinds of tools and utilities for the true WinBloze programmer, including packers, crypters, etc.
- PyPackerDetect
Small python script/library to detect whether an executable is packed.
- PyPackerDetect (refactored)
A complete refactoring of the original project to a Python package with a console script to detect whether an executable is packed.
- PyPeid
Yet another implementation of PEiD with yara-python.
- Quick Unpack
Generic unpacker that facilitates the unpacking process.
- RDG Packer Detector
Packer detection tool.
- Reko
Free decompiler for machine code binaries.
- REMINDer
Packing detection tool based on the entropy value of the entry point section and the WRITE attribute.
- REMnux
Linux toolkit for reverse-engineering and analyzing malicious software.
- Renovo
Detection tool built on top of TEMU (dynamic analysis component of BitBlaze) based on the execution of newly-generated code and monitoring memory writes after the program starts.
- ResourceHacker
Resource editor for 32bit and 64bit Windows applications.
- RetDec
Retargetable machine-code decompiler based on LLVM.
- RTD
Rose Patch - TinyProt/Rosetiny Unpacker.
- RUPP
ROSE SWE UnPaCKER PaCKaGE (for DOS executables only).
- SecML Malware
Create adversarial attacks against machine learning Windows malware detectors.
- ShowStopper
Tool to help malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
- StudPE
PE viewer and editor (32/64 bit).
- SymPack
Safe, portable, largely effective but not generic library for packing detection and unpacking ; part of the Norton Antivirus solution.
- Titanium Platform
Machine learning hybrid cloud platform that harvests thousands of file types at scale, speeds threat detection through machine learning binary analysis, and continuously monitors an index of over 10B files for future threats.
- TrID
Utility for identifying file types from their binary signatures.
- Triton
Dynamic binary analysis library.
- Tuts 4 You
Non-commercial, independent community dedicated to the sharing of knowledge and information on reverse code engineering.
- Unipacker
Automatic and platform-independent unpacker for Windows binaries based on emulation.
- UnpacMe
Automated malware unpacking service.
- Unpckarc
Packed executables detection tool relying on several heuristics.
- UU
Universal Unpacker.
- Uundo
Universal Undo - Universal Unpacker.
- Uunp (IDA Pro plugin)
IDA Pro debugger plug-in module automating the analysis and unpacking of packed binaries.
- UUP
Universal exe-file UnPacker.
- VMHunt
Set of tools for analyzing virtualized binary code ; now only supports 32 bit traces.
- VMUnpacker
Unpacker based on the technology of virtual machine.
- Winbindex
An index of Windows binaries, including download links for executables such as EXE, DLL and SYS files.
- yarGen
Generator for YARA rules - The main principle is the creation of yara rules from strings found in malware files while removing all strings that also appear in goodware files.