Trending repositories for topic binary-analysis
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
UNIX-like reverse engineering framework and command-line toolset
Program for determining types of files for Windows, Linux and MacOS.
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
A curated list of awesome resources related to executable packing
BinAbsInspector: Vulnerability Scanner for Binaries
Public API, examples, documentation and issues for Binary Ninja
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
A curated list of awesome resources related to executable packing
Public API, examples, documentation and issues for Binary Ninja
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
BinAbsInspector: Vulnerability Scanner for Binaries
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Program for determining types of files for Windows, Linux and MacOS.
UNIX-like reverse engineering framework and command-line toolset
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
UNIX-like reverse engineering framework and command-line toolset
Program for determining types of files for Windows, Linux and MacOS.
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Public API, examples, documentation and issues for Binary Ninja
A curated list of awesome resources related to executable packing
BinAbsInspector: Vulnerability Scanner for Binaries
Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detection
Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption logic, password strings, vulnerabilities, etc.
Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detection
Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption logic, password strings, vulnerabilities, etc.
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Public API, examples, documentation and issues for Binary Ninja
A curated list of awesome resources related to executable packing
Program for determining types of files for Windows, Linux and MacOS.
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
UNIX-like reverse engineering framework and command-line toolset
BinAbsInspector: Vulnerability Scanner for Binaries
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
UNIX-like reverse engineering framework and command-line toolset
Program for determining types of files for Windows, Linux and MacOS.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
A curated list of awesome resources related to executable packing
Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode
Public API, examples, documentation and issues for Binary Ninja
A plugin for IDA that can help to analyze binary file, it is based on the gpt-3.5-turbo model trained by OpenAI, the same as ChatGPT.
CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision
Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detection
Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption logic, password strings, vulnerabilities, etc.
A list of open source reverse engineering tools with a focus on binary analysis
IdaClu is a version agnostic IDA Pro plugin for grouping similar functions. Pick an existing grouping algorithm or create your own.
A curated list of awesome resources related to executable packing
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
The goal of this project is to help researchers to analyze traffic encapsulated in SSL or TLS.
IdaClu is a version agnostic IDA Pro plugin for grouping similar functions. Pick an existing grouping algorithm or create your own.
Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption logic, password strings, vulnerabilities, etc.
SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool
CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
UNIX-like reverse engineering framework and command-line toolset
Program for determining types of files for Windows, Linux and MacOS.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
A plugin for IDA that can help to analyze binary file, it is based on the gpt-3.5-turbo model trained by OpenAI, the same as ChatGPT.
A curated list of awesome resources related to executable packing
cwe_checker finds vulnerable patterns in binary executables
BinAbsInspector: Vulnerability Scanner for Binaries
CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision
Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings"
A binary visualization tool to aid with reverse engineering and malware detection similar to Cantor.Dust
The goal of this project is to help researchers to analyze traffic encapsulated in SSL or TLS.
A plugin for IDA that can help to analyze binary file, it is based on the gpt-3.5-turbo model trained by OpenAI, the same as ChatGPT.
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
:gem: Go library to parse Executable and Linkable Format (ELF) files.
Python implementation of the Packed Executable iDentifier (PEiD)
A list of open source reverse engineering tools with a focus on binary analysis
A (SLEIGH) disassembler that supports multiple architectures
Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes
A curated list of awesome resources related to executable packing