Trending repositories for topic binary-analysis
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse eng...
A guide that explains how programs transform from source code to executables. Deep dive into ELF format, linking processes, and binary optimization techniques. Perfect for systems programmers, C devel...
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Program for determining types of files for Windows, Linux and MacOS.
UNIX-like reverse engineering framework and command-line toolset
Articles and tools related to research in the Apple environment (mainly macOS).
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
The FLARE team's open-source tool to identify capabilities in executable files.
Public API, examples, documentation and issues for Binary Ninja
cwe_checker finds vulnerable patterns in binary executables
BinAbsInspector: Vulnerability Scanner for Binaries
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
DyninstAPI: Tools for binary instrumentation, analysis, and modification.
A curated list of awesome resources related to executable packing
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse eng...
A guide that explains how programs transform from source code to executables. Deep dive into ELF format, linking processes, and binary optimization techniques. Perfect for systems programmers, C devel...
Articles and tools related to research in the Apple environment (mainly macOS).
Public API, examples, documentation and issues for Binary Ninja
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
cwe_checker finds vulnerable patterns in binary executables
Program for determining types of files for Windows, Linux and MacOS.
The FLARE team's open-source tool to identify capabilities in executable files.
DyninstAPI: Tools for binary instrumentation, analysis, and modification.
BinAbsInspector: Vulnerability Scanner for Binaries
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
UNIX-like reverse engineering framework and command-line toolset
A curated list of awesome resources related to executable packing
Toolkit to emulate firmware and analyse it for security vulnerabilities
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse eng...
A guide that explains how programs transform from source code to executables. Deep dive into ELF format, linking processes, and binary optimization techniques. Perfect for systems programmers, C devel...
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Program for determining types of files for Windows, Linux and MacOS.
UNIX-like reverse engineering framework and command-line toolset
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Articles and tools related to research in the Apple environment (mainly macOS).
The FLARE team's open-source tool to identify capabilities in executable files.
LIEF - Library to Instrument Executable Formats (C++, Python, Rust)
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Public API, examples, documentation and issues for Binary Ninja
cwe_checker finds vulnerable patterns in binary executables
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
Toolkit to emulate firmware and analyse it for security vulnerabilities
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse eng...
A guide that explains how programs transform from source code to executables. Deep dive into ELF format, linking processes, and binary optimization techniques. Perfect for systems programmers, C devel...
Articles and tools related to research in the Apple environment (mainly macOS).
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
The goal of this project is to help researchers to analyze traffic encapsulated in SSL or TLS.
Public API, examples, documentation and issues for Binary Ninja
The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber
Program for determining types of files for Windows, Linux and MacOS.
A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
cwe_checker finds vulnerable patterns in binary executables
Toolkit to emulate firmware and analyse it for security vulnerabilities
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse eng...
A guide that explains how programs transform from source code to executables. Deep dive into ELF format, linking processes, and binary optimization techniques. Perfect for systems programmers, C devel...
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse eng...
Program for determining types of files for Windows, Linux and MacOS.
A guide that explains how programs transform from source code to executables. Deep dive into ELF format, linking processes, and binary optimization techniques. Perfect for systems programmers, C devel...
UNIX-like reverse engineering framework and command-line toolset
The FLARE team's open-source tool to identify capabilities in executable files.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
LIEF - Library to Instrument Executable Formats (C++, Python, Rust)
A plugin for IDA that can help to analyze binary file, it can be based on models such as gpt-3.5 turbo, gpt-4 trained by OpenAI, the same as ChatGPT.
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Toolkit to emulate firmware and analyse it for security vulnerabilities
A curated list of awesome resources related to executable packing
Public API, examples, documentation and issues for Binary Ninja
cwe_checker finds vulnerable patterns in binary executables
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse eng...
Articles and tools related to research in the Apple environment (mainly macOS).
PE32 (x86) and PE32+ (x64) binaries analysis tool, resources viewer/extractor.
CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
A curated list of awesome binary analysis automation training, resources, and tools.
A list of open source reverse engineering tools with a focus on binary analysis
IdaClu is a version agnostic IDA Pro plugin for grouping similar functions. Pick an existing grouping algorithm or create your own.
Program for determining types of files for Windows, Linux and MacOS.
A plugin for IDA that can help to analyze binary file, it can be based on models such as gpt-3.5 turbo, gpt-4 trained by OpenAI, the same as ChatGPT.
:gem: Go library to parse Executable and Linkable Format (ELF) files.
Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SC...
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse eng...
A guide that explains how programs transform from source code to executables. Deep dive into ELF format, linking processes, and binary optimization techniques. Perfect for systems programmers, C devel...
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
Articles and tools related to research in the Apple environment (mainly macOS).
ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It provides a modular interface for adding new parsers for identifyi...
A curated list of awesome binary analysis automation training, resources, and tools.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Program for determining types of files for Windows, Linux and MacOS.
UNIX-like reverse engineering framework and command-line toolset
The FLARE team's open-source tool to identify capabilities in executable files.
LIEF - Library to Instrument Executable Formats (C++, Python, Rust)
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
A curated list of awesome resources related to executable packing
A plugin for IDA that can help to analyze binary file, it can be based on models such as gpt-3.5 turbo, gpt-4 trained by OpenAI, the same as ChatGPT.
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse eng...
Public API, examples, documentation and issues for Binary Ninja
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse eng...
CLAP(Contrastive Language-Assembly Pre-training) learns transferable binary code representations with natural language supervision
IdaClu is a version agnostic IDA Pro plugin for grouping similar functions. Pick an existing grouping algorithm or create your own.
A command line tool for extracting machine learning ready data from software binaries powered by Radare2
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SC...
A binary visualization tool to aid with reverse engineering and malware detection similar to Cantor.Dust
A framework for program analysis with a focus on modeling programmer assumptions, context- and path-sensitive analyses, and type checking.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
:gem: Go library to parse Executable and Linkable Format (ELF) files.
The FLARE team's open-source tool to identify capabilities in executable files.
Function signature matching and signature generation plugin for Binary Ninja