*** Welcome to piglix ***

UPX

UPX
Ultimate Packer for eXecutebles.png
Initial release May 26, 1998; 19 years ago (1998-05-26)
Stable release
3.94 / May 12, 2017; 16 days ago (2017-05-12)
Repository github.com/upx/upx
Written in C++, Assembly
Operating system Microsoft Windows, Linux, macOS, DOS, Atari TOS
Platform i386, MIPS, AMD64, ARM, PowerPC, m68k
Available in English
Type Executable compression
License GPL with exception for compressed executables
Website upx.github.io

UPX (Ultimate Packer for Executables) is a free and open source executable packer supporting a number of file formats from different operating systems.

UPX uses a data compression algorithm called UCL, which is an open source implementation of portions of the proprietary NRV (Not Really Vanished) algorithm.

UCL has been designed to be simple enough that a decompressor can be implemented in just a few hundred bytes of code. UCL requires no additional memory to be allocated for decompression, a considerable advantage that means that a UPX packed executable usually requires no additional memory.

UPX (since 2.90 beta) can use LZMA on most platforms; however, this is disabled by default for 16-bit due to slow decompression speed on older computers (use --lzma to force it on).

Starting with version 3.91, UPX also supports 64-Bit (x64) executable files on the Windows platform. This feature is currently declared as experimental.

UPX supports two mechanisms for decompression: an in-place technique and extraction to temporary file.

The in-place technique, which decompresses the executable into memory, is not possible on all supported platforms. The rest use extraction to temporary file. This procedure involves additional overhead and other disadvantages; however, it allows any executable file format to be packed.

The extraction to temporary file method has several disadvantages:

Unmodified UPX packing is often detected and unpacked by antivirus software scanners. UPX also has a built-in feature for unpacking unmodified executables packed with itself. The default license for the existing stubs explicitly forbids modification that prevent manual unpacking. Most antivirus products will raise an alarm when UPX header is detected.

UPX does not currently support PE files containing CIL code intended to run on the .NET Framework.


...
Wikipedia

...