Checking quota...

Binary Unpacker

Automated extraction from VMProtect, Themida, UPX, PyInstaller, Enigma and 40+ commercial packing layers — using CPU emulation and memory-dump reconstruction.

bolt
// Mode 01
Auto Mode
Detects the packer and unpacks automatically. Recommended for most binaries.
memory
// Mode 02
Memory Dump
Raw memory capture and reconstruction. For exotic or custom packers Auto can't classify.
upload_file
Drop Packed Binary Here
— or click to browse —
.exe.dll.apk.py (compiled).pyd.net
layers
Supports 50+ packers
VMProtect, Themida, Enigma, UPX, ASPack, MPRESS, PECompact, PyInstaller, Nuitka, and more.
shield_lock
Memory-safe sandbox
Full CPU emulation. No real execution. Outbound network blocked at the kernel level.
build
Reconstructed PE headers
Original entry point, imports, and sections rebuilt to load cleanly in IDA, Ghidra and x64dbg.
// Frequently Asked

Common Questions

The unpacker supports Windows PE executables (.exe), DLL files (.dll), Android APKs, ELF Linux binaries, Python compiled executables (PyInstaller, cx_Freeze), and any installer format that 7z can read (NSIS, Inno Setup, CAB, RAR). Maximum file size is 100MB.

VMProtect, Themida, Enigma, and other commercial protectors cannot be automatically unpacked — they use virtualization and mutation that requires runtime execution to reverse. The unpacker will detect these protectors, generate a PE memory image, dump high-entropy sections, and extract any embedded payloads. Use Memory Dump mode for the most comprehensive output on these targets.

The ZIP contains everything extracted during analysis: unpacked binary, decompiled source files (for PyInstaller/cx_Freeze), PE memory image, embedded payload dumps, high-entropy section dumps, export tables (for DLLs), DEX class names (for APKs), extracted strings, and a full analysis log. Contents vary by binary type.

The main analysis (dashboard upload) generates an AI intelligence report with threat scoring, YARA signatures, CAPA capabilities, secrets scanning, and a PDF. The unpacker focuses purely on extraction — getting the actual decompressed binary, source code, or artifacts out of the file. Both tools complement each other.

Most unpacking jobs complete in 15 to 60 seconds. PyInstaller and UPX jobs are fastest (under 20 seconds). .NET decompilation with ILSpy can take up to 2 minutes for large assemblies. APK decompilation with jadx may take up to 3 minutes. The live terminal shows real-time progress.

No. The unpacker is available on all premium plans — Monthly, 6-Month, Yearly, and Team. Free accounts do not have unpacker access. To upgrade, visit the Pricing page.