# evbunpack **Repository Path**: mashen666/evbunpack ## Basic Information - **Project Name**: evbunpack - **Description**: No description available - **Primary Language**: Unknown - **License**: Apache-2.0 - **Default Branch**: dev - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2024-09-26 - **Last Updated**: 2024-09-26 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # evbunpack [Enigma Virtual Box](https://enigmaprotector.com/) unpacker ## Features Unpacks PE / external external packages made with [Enigma Vitrual Box](https://enigmaprotector.com/) Supports compressed archives and basically every recent version of EVB (tested 6.x & 9.x) Can also restore the original executable for easier reverse engineering ### Installation pip install evbunpack If PE restoration is desired, install [pefile](https://github.com/erocarrera/pefile) alongside this script ### Usage usage: __main__.py [-h] [--ignore-pe IGNORE_PE] [--legacy] [--list] file output Enigma Vitural Box Unpacker positional arguments: file File to be unpacked output Extract destination directory options: -h, --help show this help message and exit --ignore-pe IGNORE_PE Treat PE files like external packages and thereby does not recover the original executable (for usage without pefile) --legacy Enable compatibility mode to work with older (6.x) EVB packages --list Don't extract the files and print the TOC only (surpresses other output) ### Examples python -m evbunpack Lycoris_radiata.mys ../biman5_chs_moe python -m evbunpack biman2.exe ./extract --legacy ## TODO - ~~Restore original PEs~~ - Registery configuration extraction ## Credits [evb-extractor](https://github.com/EVBExtractor/evb-extractor) [aplib](https://github.com/snemes/aplib) ## License Apache 2.0 License