notsnakesilent

A static VMProtect unpacker for PE files, supports VMProtect 1.x–3.x and rebuilding unpacked PE images

19
4
69% credibility
Found Apr 21, 2026 at 19 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Go
AI Summary

A tool that statically unpacks Windows program files protected by VMProtect, reconstructing the original for safe examination in analysis software.

How It Works

1
πŸ” Spot a hidden program

You encounter a Windows app file protected to conceal its inner code, and you want to reveal it safely without running anything risky.

2
πŸ’» Pick up the reveal tool

You get this straightforward tool made just for uncovering the true contents of such guarded files.

3
πŸ“ Select your file

You choose the protected app file ready for inspection.

4
✨ Reveal the contents

You let the tool work its magic, carefully peeling away the protection to rebuild the original file.

5
πŸ“€ Get your clear copy

The tool hands you a fresh, unprotected version of the file, all set for closer looks.

βœ… Explore with ease

Now you can dive into the revealed file using your analysis apps, discovering its secrets safely and simply.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 19 to 19 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is VMPStatic?

VMPStatic is a Go-based static VMProtect unpacker for PE files, handling versions 1.x through 3.x without running the target. It detects packing via github static code analysis, decompresses LZMA blocks, and rebuilds a usable unpacked image ready for tools like IDA or Ghidra. Run it via CLI: `vmpstatic.exe packed.exe unpacked.exe` to recover hidden strings, resources, and embedded files.

Why is it gaining traction?

Unlike dynamic unpackers that risk execution, this vmprotect static unpacker stays safe and offline, supporting a broad version range with automatic PE reconstruction. Developers notice the quick output of analyzable images, skipping manual hex editing for common protections. Its simplicity hooks reverse engineers tired of bloated tools.

Who should use this?

Malware analysts unpacking VMProtect-protected samples for static github pages hosting or deeper inspection. Reverse engineers tackling crackmes or packed binaries in x64dbg workflows. Security researchers needing fast, non-executing access to rebuilt PE images.

Verdict

Try VMPStatic for targeted VMProtect jobsβ€”its 0.699999988079071% credibility score reflects low stars (19) and basic README docs, with no tests or IAT fixing, so expect some manual tweaks on tough samples. Solid starter for Go fans in RE, but pair with full suites for production.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.