diff --git a/CHANGELOG.md b/CHANGELOG.md
index e68ad1b..9046c03 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -14,6 +14,8 @@
- Add RunAsDate
- Add Keygener Assistant
- Add CryptoTester
+- New Toolkit Extra: Oldies
+- New Toolkit Extra: Unpacking
### Changed
diff --git a/README.ES.md b/README.ES.md
index cde31a7..98292b8 100644
--- a/README.ES.md
+++ b/README.ES.md
@@ -33,7 +33,7 @@ El mismo está en la carpeta `bin\updater\updater.exe`.
## Herramientas
-El toolkit está compuesto por 90 herramientas que cubren todo lo que podemos necesitar para la reversa y el análisis.
+El toolkit está compuesto por 94 herramientas que cubren todo lo que podemos necesitar para la reversa y el análisis.
Las herramientas están todas descargadas de sus páginas oficiales pero de todas formas se recomienda usarlas con cautela, en especial las que las paginas oficiales son hilos en foros y ese tipo de cosas.
Para ver la lista completa de herramientas puedes [hacerlo aqui](TOOLS.md).
diff --git a/README.md b/README.md
index 3436f69..3ed32f8 100644
--- a/README.md
+++ b/README.md
@@ -32,7 +32,7 @@ You will find the binary in the folder `bin\updater\updater.exe`.
## Tool set
-This toolkit is composed by 90 apps that cover everything we might need to perform reverse engineering and binary/malware analysis.
+This toolkit is composed by 94 apps that cover everything we might need to perform reverse engineering and binary/malware analysis.
Every tool has been downloaded from their original/official websites, but we still recommend you to use them with caution, specially those tools whose official pages are forum threads. Always exercise common sense.
You can check the complete list of tools [here](TOOLS.md).
diff --git a/README.zh_CN.md b/README.zh_CN.md
index 25cf19a..fb6ecb7 100644
--- a/README.zh_CN.md
+++ b/README.zh_CN.md
@@ -30,7 +30,7 @@
## 工具集
-这个工具包由 90 个应用组成,涵盖了我们执行逆向工程和二进制/恶意软件分析可能需要的一切。
+这个工具包由 94 个应用组成,涵盖了我们执行逆向工程和二进制/恶意软件分析可能需要的一切。
每个工具都是从他们的原发布地址/官网下载的,但是我们还是建议大家谨慎使用,尤其是那些官方页面是论坛线程的工具。经常运用常识。
您可以在 [here](TOOLS.md) 查看完整的工具列表。
diff --git a/TOOLS-LITE.md b/TOOLS-LITE.md
index aba79c6..e60eaf0 100644
--- a/TOOLS-LITE.md
+++ b/TOOLS-LITE.md
@@ -341,6 +341,26 @@ Unlike most archiving programs, UniExtract is not limited to **standard archives
***Developer:*** dswlab
***Description:*** This tool uses the technology of Virtual Machines. It can unpack various known & unknown shells. It is suitable for unpacking the shelled Trojan horse in virus analysis, and because all codes are run under the VM, they will not take any danger to your system.
+### Magicmida *Available using the extra called: Unpacking*
+***Web:*** https://github.com/Hendi48/Magicmida
+***Developer:*** Hendi48
+***Description:*** Magicmida is a Themida auto-unpacker that works on some 32-bit applications. It works on all versions of Windows.
+
+### NoVmp *Available using the extra called: Unpacking*
+***Web:*** https://github.com/can1357/NoVmp
+***Developer:*** Can Bölük
+***Description:*** A static devirtualizer for VMProtect x64 3.x powered by VTIL.
+
+### VMUnprotect *Available using the extra called: Unpacking*
+***Web:*** https://github.com/void-stack/VMUnprotect
+***Developer:*** voidstack
+***Description:*** VMUnprotect is a project engaged in hunting virtualized VMProtect methods. It makes use of Harmony to dynamically read VMP behavior. Currently only supports method administration. Works on VMProtect 3.6.0 (Latest) and few versions back.
+
+### VMUnprotect Dumper *Available using the extra called: Unpacking*
+***Web:*** https://github.com/void-stack/VMUnprotect.Dumper
+***Developer:*** voidstack
+***Description:*** VMUnprotect.Dumper is a project engaged in hunting tampered VMProtect assemblies. It makes use of AsmResolver to dynamically unpack VMP protected assembly. Works on VMProtect 3.7.0 (Latest) and few versions back.
+
### XVolkolak
***Web:*** https://horsicq.github.io/
***Developer:*** Hors
diff --git a/TOOLS.md b/TOOLS.md
index f6ea6c4..6e86190 100644
--- a/TOOLS.md
+++ b/TOOLS.md
@@ -501,6 +501,26 @@ Unlike most archiving programs, UniExtract is not limited to **standard archives
***Developer:*** dswlab
***Description:*** This tool uses the technology of Virtual Machines. It can unpack various known & unknown shells. It is suitable for unpacking the shelled Trojan horse in virus analysis, and because all codes are run under the VM, they will not take any danger to your system.
+### Magicmida *Available using the extra called: Unpacking*
+***Web:*** https://github.com/Hendi48/Magicmida
+***Developer:*** Hendi48
+***Description:*** Magicmida is a Themida auto-unpacker that works on some 32-bit applications. It works on all versions of Windows.
+
+### NoVmp *Available using the extra called: Unpacking*
+***Web:*** https://github.com/can1357/NoVmp
+***Developer:*** Can Bölük
+***Description:*** A static devirtualizer for VMProtect x64 3.x powered by VTIL.
+
+### VMUnprotect *Available using the extra called: Unpacking*
+***Web:*** https://github.com/void-stack/VMUnprotect
+***Developer:*** voidstack
+***Description:*** VMUnprotect is a project engaged in hunting virtualized VMProtect methods. It makes use of Harmony to dynamically read VMP behavior. Currently only supports method administration. Works on VMProtect 3.6.0 (Latest) and few versions back.
+
+### VMUnprotect Dumper *Available using the extra called: Unpacking*
+***Web:*** https://github.com/void-stack/VMUnprotect.Dumper
+***Developer:*** voidstack
+***Description:*** VMUnprotect.Dumper is a project engaged in hunting tampered VMProtect assemblies. It makes use of AsmResolver to dynamically unpack VMP protected assembly. Works on VMProtect 3.7.0 (Latest) and few versions back.
+
### XVolkolak
***Web:*** https://horsicq.github.io/
***Developer:*** Hors