UNIX-like reverse engineering framework and command-line toolset
-
Updated
Jun 12, 2024 - C
UNIX-like reverse engineering framework and command-line toolset
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Program for determining types of files for Windows, Linux and MacOS.
LIEF - Library to Instrument Executable Formats
Dynamic Instrumentation Tool Platform
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Symbolic execution tool
State-of-the-art native debugging tool
Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode
DIE engine
Binary Analysis Platform
BinAbsInspector: Vulnerability Scanner for Binaries
EMBA - The firmware security analyzer
Public API, examples, documentation and issues for Binary Ninja
Automated static analysis tools for binary programs
BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework
DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.
Pintool example and PoC for dynamic binary analysis
Add a description, image, and links to the binary-analysis topic page so that developers can more easily learn about it.
To associate your repository with the binary-analysis topic, visit your repo's landing page and select "manage topics."