> cat /dev/github | grep security-tools
discovered 30 Mar 2026

mal_unpack

C โ˜… 798 via github-topic
โ†’ View on GitHub

AI Summary: mal_unpack is a dynamic malware unpacker that leverages PE-sieve to deploy packed malware, allowing it to unpack and dump the payload while terminating the original process. Its primary use case is for malware analysis in controlled environments, with notable features including options for dumping implanted PEs, shellcodes, and modified artifacts, as well as performance enhancements through an auxiliary driver.


README

mal_unpack

Build status Codacy Badge Commit activity Last Commit

GitHub release GitHub release date Github All Releases Github Latest Release

License Platform Badge

Dynamic unpacker based on PE-sieve ( ๐Ÿ“– Read more ).

It deploys a packed malware, waits for it to unpack the payload, dumps the payload, and kills the original process.

[!CAUTION]
This unpacker deploys the original malware. Use it only on a VirtualMachine.

โš™ Usage

Basic usage:

mal_unpack.exe /exe <path_to_the_malware> /timeout <timeout: ms>
  • By default, it dumps implanted PEs.
  • If you want to dump shellcodes, use the option: /shellc.
  • If you want to dump modified/hooked/patched PEs, use the option /hooks.
  • If you want the unpacker to terminate on timeout, rather than on the first found implant, use /trigger T.

[!IMPORTANT]
The available arguments are documented on Wiki. They can also be listed using the argument /help.

๐Ÿ›  Helpers and utilities

Clone

Use recursive clone to get the repo together with submodules:

git clone --recursive https://github.com/hasherezade/mal_unpack.git

Builds

Download the latest release.