awesome-executable-packing
by packing-box
A comprehensive curated list of resources, tools, and literature focused on executable packing and its detection for malware analysis and security research.
A curated list of awesome resources related to executable packing
Primary Use Case
This repository serves as a centralized knowledge base for security researchers, malware analysts, and reverse engineers interested in understanding executable packing techniques and countermeasures. Users can leverage the curated documentation, tools, and datasets to study packers, detect packed malware, and improve unpacking and analysis workflows.
- Curated literature including documentation, scientific research, and blog posts on executable packing
- Comprehensive lists of packers categorized by era (before 2000, 2000-2010, after 2010)
- References to tools for detecting and unpacking packed executables
- Coverage of multiple executable formats such as PE and ELF
- Detailed explanations of packing techniques including compression, encryption, mutation, and virtualization
- Includes datasets useful for research and training
- Focus on anti-debugging and anti-unpacking protection techniques
- Leverage the curated datasets and tools to enhance unpacking automation in malware analysis pipelines.
- Integrate knowledge from this repository into purple team exercises to improve detection of packed malware and evasion techniques.
- Use the documentation to train blue team analysts on recognizing and mitigating anti-debugging and anti-unpacking protections.
- Red teams can use the packers and anti-analysis techniques to simulate advanced adversary behaviors in engagement scenarios.
- Incorporate the scientific research references to stay updated on emerging packing methods and detection strategies.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about awesome-executable-packing. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
This tool hasn't been indexed yet. Request indexing to enable AI chat.
Admin will review your request within 24 hours
Related Tools
x64dbg
x64dbg/x64dbg
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
theZoo
ytisf/theZoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
flare-vm
mandiant/flare-vm
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
capa
mandiant/capa
The FLARE team's open-source tool to identify capabilities in executable files.
retoolkit
mentebinaria/retoolkit
Reverse Engineer's Toolkit
awesome-yara
InQuest/awesome-yara
A curated list of awesome YARA rules, tools, and people.
