Example Usage
## Showcase
We are humbled to see some active usage of Un{i}packer for research projects, university courses and other resources that teach students about malware obfuscation:
- [Tutorial video](https://youtu.be/ee5_JUIEf8Q) belonging to the Master's course "Malware Analysis and Cyber Threat Intelligence" at the Westphalian University,
demonstrating how to analyze obfuscated malware with Un{i}packer
- [DeepReflect](https://www.usenix.org/conference/usenixsecurity21/presentation/downing): Paper presenting a tool for localizing and identifying malware
components within a malicious binary. Its dataset relies on a Un{i}packer preprocessing step
- [BDHunter](https://dl.acm.org/doi/abs/10.1145/3433210.3457894): Paper describing a system that automatically identifies behavior dispatchers to assist triggering malicious behaviors.
The tool requires unpacked malware samples as input, where the authors propose using Un{i}packer
- [JARV1S Disassembler](https://github.com/L1NNA/JARV1S-Disassembler): Disassembler that uses Un{i}packer as a preprocessing step
- [Anti-Anti-Virus 2](https://www.cs.virginia.edu/~cr4bd/4630/S2021/slides/20210301-slides.pdf) lecture of University of Virginia's