Awesome Executable Packing
An Awesome directory of resources on packing and unpacking executable formats, including tools and research on executable packing.
About this tool
title: Awesome Executable Packing slug: awesome-executable-packing url: https://github.com/dhondta/awesome-executable-packing#readme brand: GitHub brand_logo: https://github.githubassets.com/images/modules/logos_page/GitHub-Mark.png category: Themed Directories tags:
- awesome-lists
- security
- reverse-engineering featured: false
Overview
Awesome Executable Packing is a curated, open-source directory of resources about packing and unpacking executable formats. It focuses on formats such as Portable Executable (PE), Executable and Linkable Format (ELF), and others, and aggregates learning materials, research, and tools used in software protection, reverse engineering, and malware analysis.
What Is Covered
- Concepts and techniques of executable packing (modifying an executable without changing its intended behavior).
- Packing across multiple executable formats (e.g., PE, ELF, and more).
- Both theoretical and practical aspects of detecting and unpacking packed executables.
Features
-
Curated Resource List
- Centralized catalog of references related to executable packing.
- Emphasis on quality, relevance, and organization typical of "awesome" lists.
-
Multi-Format Focus
- Includes resources for multiple executable formats:
- Portable Executable (PE)
- Executable and Linkable Format (ELF)
- Other common executable types
- Includes resources for multiple executable formats:
-
Learning & Reference Materials
- Links to books
- Academic and industry papers
- Blog posts and technical write-ups
- Other written resources explaining:
- Packing concepts
- Practical packing/unpacking workflows
- Detection and analysis of packed binaries
-
Packers Catalog
- References to various executable packers used for:
- Software protection/obfuscation
- Compression
- Malware packing and evasion
- References to various executable packers used for:
-
Detection & Unpacking Tools
- Tools for identifying whether an executable is packed
- Tools and frameworks for unpacking executables
- Resources oriented toward reverse engineering and security analysis
-
Literature Sections
- Documentation section for practical how-to and reference docs
- Scientific Research section for formal studies and research papers
-
Open Collaboration
- Public repository with standard open-source meta-files:
README.mddescribing the listLICENSEdefining usage rightsCONTRIBUTING.mdwith contribution guidelinesCODE-OF-CONDUCT.mddescribing expected community behavior
- Public repository with standard open-source meta-files:
Use Cases
- Learning executable packing techniques and theory
- Studying malware packing and evasion strategies
- Finding tools to detect and unpack packed executables
- Supporting reverse engineering and binary analysis workflows
Pricing
- Not a commercial product or service.
- Open-source GitHub directory, free to access and use under its published license.
Loading more......
Information
Categories
Tags
Similar Products
6 result(s)A curated Awesome-style directory of resources focused on application security, including guides, tools, and best practices for securing software applications.
An Awesome collection of honeypot resources and tools for building deception traps to study and detect attackers.
An Awesome directory of incident response tools, playbooks, and learning materials for handling and investigating security incidents.
An Awesome collection of resources about lockpicking, covering the theory and practice of opening locks without keys.
An Awesome list of resources for cybersecurity blue teams, focusing on defense, monitoring, and detection capabilities.
An awesome directory of Android security resources, including tools, guides, and research for analyzing, exploiting, and defending Android applications and devices.