Skip to content

An experimental dynamic malware unpacker based on Intel Pin and PE-sieve

Notifications You must be signed in to change notification settings

Artorios/pin_n_sieve

 
 

Repository files navigation

Pin'n'Sieve

GitHub release

A dynamic malware unpacker based on Intel Pin and PE-sieve (deploys PE-sieve scan on specific triggers). Caution: during the process the malware will be deployed. Use it on a VM only.

WARNING: this is an experimental version

How to build?

To compile the prepared project you need to use Visual Studio >= 2012. It was tested with Intel Pin 3.19.

  1. Clone this repo into \source\tools that is inside your Pin root directory.
  2. Open the project in Visual Studio.
  3. Modify the file my_paths.h, and set the path to windows.h into _WINDOWS_H_PATH_, appropriate to your environment.
  4. The other installation steps are analogous to the ones explained in this Wiki.

About

An experimental dynamic malware unpacker based on Intel Pin and PE-sieve

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C++ 88.4%
  • Batchfile 7.3%
  • C 2.5%
  • VBScript 1.8%