In this repository, we are comprehending some common packing techniques used by the malware. We will be using a simple uninfected sample program for understanding. You can use these techniques as a reference to unpacking original malware samples, based on their packing techniques.