Windows Pe Packer

🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engineering.
Alternatives To Windows Pe Packer
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Awesome Hacking67,818
a month ago27cc0-1.0
A collection of various awesome lists for hackers, pentesters and security researchers
12 hours ago566otherC++
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Radare218,59542a day ago13March 03, 2014844lgpl-3.0C
UNIX-like reverse engineering framework and command-line toolset
Apktool17,27133 days ago5July 22, 202344apache-2.0Java
A tool for reverse engineering Android apk files
2 days ago478gpl-3.0C++
Free and Open Source Reverse Engineering Platform powered by rizin
Unicorn6,594421 days ago8November 01, 202270gpl-2.0C
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
Capstone6,59225 days ago2April 12, 2022353otherC
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), BPF, Ethereum VM, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.
2 months agomitCSS
An Information Security Reference That Doesn't Suck; for non-MS Git hosted version.
2 months ago19June 11, 202312mitGo
Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store
Ctf All In One3,313
6 months ago3cc-by-sa-4.0C
Alternatives To Windows Pe Packer
Select To Compare

Alternative Project Comparisons

Windows PE Packer

C MASM CMake Windows License


About The Project


PE-Packer is a simple packer for Windows PE files. The new PE file after packing can obstruct the process of reverse engineering.

It will do the following things when packing a PE file:

  • Transforming the original import table.
  • Encrypting sections.
  • Clearing section names.
  • Installing the shell-entry.

When running a packed PE file, the shell-entry will decrypt and load the original program as follows:

  • Decrypting sections.
  • Initializing the original import table.
  • Relocation.

Before packing, using some disassembly tools can disassemble the executable file to analyze the code, such as IDA Pro.

  • Disassembling the code.


  • Searching constant strings.


  • Analyzing the import table.


After packing, the reverse analysis will be obstructed.

  • Disassembling the code.


  • Searching constant strings.


  • Analyzing the import table.



This project is just a demo for beginners to study Windows PE Format and Assembly Language. It still has some compatibility problems and bugs that cannot be used in practice.

Getting Started


The project must configure on/for Windows 32-bit and can only process 32-bit .exe programs now.

  • Install MASM32.
  • Install MinGW-w64, select i686 architecture.
  • Install CMake.
  • Set the PATH environment variables of these three tools.


mkdir -p build
cd build
cmake .. -D CMAKE_C_COMPILER=gcc -G "MinGW Makefiles"
cmake --build .

Or run the build.ps1 file directly:

PS> .\build.ps1


To pack a program, you must specify its input name and the output name.

PE-Packer <input-file> <output-file>

For example:

PE-Packer hello.exe hello-pack.exe


You can use Doxygen to generate the document.



PE Format - Windows Dev Center


Distributed under the GNU General Public License. See LICENSE for more information.

Popular Reverse Engineering Projects
Popular Security Projects
Popular Software Development Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Reverse Engineering