Trending repositories for topic binary-analysis
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Program for determining types of files for Windows, Linux and MacOS.
UNIX-like reverse engineering framework and command-line toolset
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
cwe_checker finds vulnerable patterns in binary executables
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
Program for determining types of files for Windows, Linux and MacOS.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
cwe_checker finds vulnerable patterns in binary executables
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
UNIX-like reverse engineering framework and command-line toolset
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Program for determining types of files for Windows, Linux and MacOS.
UNIX-like reverse engineering framework and command-line toolset
A curated list of awesome resources related to executable packing
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
cwe_checker finds vulnerable patterns in binary executables
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
Program for determining types of files for Windows, Linux and MacOS.
A curated list of awesome resources related to executable packing
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
cwe_checker finds vulnerable patterns in binary executables
UNIX-like reverse engineering framework and command-line toolset
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Program for determining types of files for Windows, Linux and MacOS.
UNIX-like reverse engineering framework and command-line toolset
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SC...
Public API, examples, documentation and issues for Binary Ninja
A plugin for IDA that can help to analyze binary file, it can be based on models such as gpt-3.5 turbo, gpt-4 trained by OpenAI, the same as ChatGPT.
A curated list of awesome resources related to executable packing
Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SC...
A command line tool for extracting machine learning ready data from software binaries powered by Radare2
Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings"
Function signature matching and signature generation plugin for Binary Ninja
IdaClu is a version agnostic IDA Pro plugin for grouping similar functions. Pick an existing grouping algorithm or create your own.
Program for determining types of files for Windows, Linux and MacOS.
Public API, examples, documentation and issues for Binary Ninja
A binary visualization tool to aid with reverse engineering and malware detection similar to Cantor.Dust
A plugin for IDA that can help to analyze binary file, it can be based on models such as gpt-3.5 turbo, gpt-4 trained by OpenAI, the same as ChatGPT.
The goal of this project is to help researchers to analyze traffic encapsulated in SSL or TLS.
IdaClu is a version agnostic IDA Pro plugin for grouping similar functions. Pick an existing grouping algorithm or create your own.
SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool
ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It provides a modular interface for adding new parsers for identifyi...
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Program for determining types of files for Windows, Linux and MacOS.
UNIX-like reverse engineering framework and command-line toolset
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
A curated list of awesome resources related to executable packing
A plugin for IDA that can help to analyze binary file, it can be based on models such as gpt-3.5 turbo, gpt-4 trained by OpenAI, the same as ChatGPT.
cwe_checker finds vulnerable patterns in binary executables
Public API, examples, documentation and issues for Binary Ninja
CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision
A command line tool for extracting machine learning ready data from software binaries powered by Radare2
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SC...
:gem: Go library to parse Executable and Linkable Format (ELF) files.
A binary visualization tool to aid with reverse engineering and malware detection similar to Cantor.Dust
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
The goal of this project is to help researchers to analyze traffic encapsulated in SSL or TLS.
Python implementation of the Packed Executable iDentifier (PEiD)
A plugin for IDA that can help to analyze binary file, it can be based on models such as gpt-3.5 turbo, gpt-4 trained by OpenAI, the same as ChatGPT.
A framework for program analysis with a focus on modeling programmer assumptions, context- and path-sensitive analyses, and type checking.
A (SLEIGH) disassembler that supports multiple architectures
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.