Malware Configuration And Payload Extraction
-
Updated
Nov 15, 2024 - Python
Malware Configuration And Payload Extraction
GOD EATER 2 Extraction Tool (No Repack).
Assemblyline 4 Malware detonation service (CAPEv2)
A Python 3.12+ library to pack and unpack structured binary data.
Source code of web page crackslatinos.org
Assemblyline 4 unpacking service (UPX)
Toolkit for packing/unpacking .evp files.
Packing Tool for Pioneers of Pagonia
The double layer packing mechanism in malware is an advanced obfuscation technique designed to evade detection by security software. This method involves wrapping the malicious code in two layers of encryption or compression. The first layer serves to unpack the second, more intricately concealed layer, which then decrypts or decompresses to reveal
Make "upx -d" unpacking impossible!
Variant Vector Serialization/Deserialization (Go)
Variant Vector Serialization/Deserialization
An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).
Add a description, image, and links to the unpacking topic page so that developers can more easily learn about it.
To associate your repository with the unpacking topic, visit your repo's landing page and select "manage topics."