An automatic, platform-independent unpacker for Windows binaries using emulation to analyze packed malware.
Un{i}packer is an automatic unpacker for Windows PE files that uses emulation to extract the original code from packed binaries, particularly malware samples. It solves the problem of platform dependency in malware analysis by allowing unpacking on any operating system without requiring a Windows machine. The tool supports several popular packers and can be extended to handle others through its modular design.
Security researchers, malware analysts, and students who need to analyze packed Windows binaries, especially in environments where Windows tools are not available or when automating analysis pipelines.
Developers choose Un{i}packer because it provides a free, open-source alternative to manual unpacking or Windows-only tools, offering platform independence through emulation and ease of integration via Docker and Python. Its support for multiple packers and extensibility make it a versatile choice for malware analysis workflows.
Automatic and platform-independent unpacker for Windows binaries based on emulation
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Runs on Linux, macOS, etc., using the Unicorn Engine for emulation, eliminating the dependency on Windows machines as stated in the README.
Includes built-in support for popular packers like UPX, ASPack, and MPRESS, making it effective for common malware samples without manual setup.
Available as a Python package, Docker container, and via a RESTful API wrapper, facilitating easy integration into automated workflows.
Can handle other packers by implementing API functions or manual emulation addresses, as mentioned for unsupported packers in the README.
Used in university courses and research papers like DeepReflect and BDHunter, indicating reliability and community trust.
For unsupported packers, users must manually specify emulation addresses or rely on defaults, reducing automation as admitted in the README.
Using the Unicorn Engine for emulation can be slower than native execution, impacting analysis speed for large or complex binaries.
Requires YARA and proper setup of Unicorn Engine, which might pose installation challenges or compatibility issues on some systems.
Specifically targets Windows PE files, so it's not suitable for unpacking binaries from other platforms or non-PE formats.