β οΈ Platform Support: This project is designed primarily for Windows with local deployment. While Docker containers are used for some components, the main focus is on Windows-native execution and local AI model integration.
AI-powered reverse engineering platform combining Ghidra, Radare2, and advanced analysis tools for malware analysis and security research.
- Ghidra 12.0.4 Integration: Latest Ghidra with PyGhidra support
- Decompilation: FlatDecompilerAPI for reliable decompilation in headless mode
- Enhanced Function Analysis: Call graphs, control flow, and execution paths
- Memory Layout Analysis: Memory sections with permissions visualization
- Code Coverage: Decompilation and address space coverage metrics
- Ghidra Assistant: AI-powered reverse engineering analysis
- Security Agent: Specialized vulnerability detection
- Natural Language Query: Search analysis results using natural language
- MCP Protocol: Model Context Protocol for AI tool integration
- Function Graph: Visualize call relationships and dependencies
- Control Flow: Analyze execution paths and basic blocks
- Memory Layout: View memory sections and permissions
- Timeline View: Track analysis progress and stages
- Radare2 Integration: Command-line reverse engineering
- Transaction Support: Safe program modifications
- Analysis Properties: Customizable analysis parameters
- Program Info Management: Metadata and documentation
- Dynamic Execution: Run binaries in isolated Docker sandbox
- Frida Instrumentation: Runtime API call and memory monitoring
- angr Symbolic Execution: Path exploration and constraint solving
- pwndbg Integration: Enhanced debugging with heap analysis
- Multi-Agent System: Orchestrated analysis with AI agents
- RAG System: Context-aware retrieval from analysis history
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Windows Native (GPU) β
β βββββββββββββββ ββββββββββββββββββββ β
β β Ollama β β llm4decompile β β
β β (llama3.2) β β (1.3B-v2) β β
β β RTX 2060 β β RTX 2060 β β
β βββββββββββββββ ββββββββββββββββββββ β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β β
β http://localhost:11434 β Direct PyTorch
β β
ββββββββββββ¬βββββββββββββββ
β
βΌ
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Docker (Ghidra API) β
β βββββββββββββββ βββββββββββββββ ββββββββββββββββ β
β β WebUI βββββββΆβ FastAPI ββββββββ Celery β β
β β (Flask) β β (REST) β β Worker β β
β β β β β ββββββββββββββββ β
β β + Agents β β β β
β βββββββββββββββ βββββββββββββββ β
β β β β
β β β β
β βΌ βΌ β
β βββββββββββββββ βββββββββββββββ β
β β Redis β β Radare2 β β
β β (Broker) β β (CLI) β β
β βββββββββββββββ βββββββββββββββ β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β
βΌ
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Active RE Docker Sandbox β
β βββββββββββββββ βββββββββββββββ ββββββββββββββββ β
β β Frida β β angr β β pwndbg β β
β β Instrument β β Symbolic β β Enhanced β β
β βββββββββββββββ βββββββββββββββ β Debugging β β
β ββββββββββββββββ β
β βββββββββββββββ βββββββββββββββ β
β β Procmon β β Wireshark β β
β β Monitor β β Capture β β
β βββββββββββββββ βββββββββββββββ β
β βββββββββββββββββββββββββββββββββββββββββββββββββββββββββ β
β β Vector Database (ChromaDB) β β
β β RAG System + Knowledge Base β β
β βββββββββββββββββββββββββββββββββββββββββββββββββββββββββ β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Recommended for Windows users - Run the automated setup script:
# Run the automated setup script
python -m venv .venv
.venv\Scripts\activate
python setup.pyThe setup script will automatically:
- Check Python version and create virtual environment
- Check Visual C++ Build Tools (required for some packages)
- Install Python dependencies from requirements.txt
- Install PyTorch with CUDA for GPU support
- Check Docker installation
- Configure .env file from .env.example
- Build and start Docker containers
- Install Ollama and pull llama3.2:3b model
- Install Hugging Face CLI
If any step fails, the script will continue and show troubleshooting steps at the end. You can then:
- Fix the specific issue and run
python setup.pyagain, or - Follow the manual installation steps below for that specific component
After setup completes:
- Edit
.envfile with your settings (if not already done) - Start Ollama server in a new terminal:
ollama serve - Run the application:
python webui\app.py - Access WebUI at: http://127.0.0.1:5000
If you prefer manual installation or need to troubleshoot specific issues:
- Docker and Docker Compose
- At least 4GB RAM (8GB recommended for large binaries)
- Python 3.10+ (for local development)
For llm4decompile integration:
- VRAM: Minimum 4GB (6GB+ recommended)
- GPU: NVIDIA GPU with CUDA support (CUDA 11.8+ or 12.x)
- Compatible GPUs: RTX series (2060+, 3060+, 4060+), GTX series (1660+, 1060+), Tesla series
- AMD GPUs: Not officially supported (ROCm may work but not recommended)
Performance:
- CPU: ~30 seconds per file (not recommended for production)
- GPU: ~3-5 seconds per file (8-10x faster)
Installation:
# Check Python version
python --version # Should be 3.14.x or 3.14.3
# Create virtual environment
python -m venv .venv
.venv\Scripts\activate
# Install dependencies
pip install -r requirements.txt
# For GPU support, install PyTorch with CUDA
pip install torch torchvision torchaudio --index-url https://download.pytorch.org/whl/cu126
# Verify GPU availability
python -c "import torch; print('CUDA available:', torch.cuda.is_available())"Ollama Models (for Chat & AI):
Available models for general AI assistance:
- qwen3-vl:30b - 30B parameters, vision-language model (requires 16GB+ VRAM)
- qwen3-vl:8b - 8B parameters, vision-language model (requires 6GB+ VRAM)
- qwen3-vl:4b - 4B parameters, vision-language model (requires 4GB+ VRAM)
- qwen3.5:27b - 27B parameters, general purpose (requires 16GB+ VRAM)
- qwen3.5:9b - 9B parameters, general purpose (requires 6GB+ VRAM)
- qwen3.5:4b - 4B parameters, general purpose (requires 4GB+ VRAM)
- llama3.2:3b - 3B parameters, general purpose (recommended for RTX 2060)
Ollama Setup (llama3.2:3b):
# Install Ollama for Windows
irm https://ollama.com/install.ps1 | iex
# Start Ollama server
ollama serve
# Download llama3.2:3b model
ollama pull llama3.2:3b
# To use other models, replace with:
# ollama pull qwen3.5:4b
# ollama pull qwen3-vl:4b
# Verify
Invoke-RestMethod -Uri "http://localhost:11434/api/tags"
# or
curl http://localhost:11434/api/tagsHugging Face Authentication (Recommended):
Some models require Hugging Face authentication for faster downloads and access to restricted models. Installing HF CLI and logging in will:
- Increase download speed - Higher rate limits for authenticated users
- Access restricted models - Some models are only available to authenticated users
- Avoid rate limiting - Prevent download throttling
# Install Hugging Face CLI for Windows
powershell -ExecutionPolicy ByPass -c "irm https://hf.co/cli/install.ps1 | iex"
# Login to Hugging Face
hf auth login
# Follow the prompts to:
# 1. Open https://huggingface.co/settings/tokens
# 2. Create a new access token (select "Read" permission)
# 3. Paste the token when prompted
# 4. Add token as git credential (optional but recommended)
# Verify login
hf auth whoamiNote: Without HF_TOKEN, you may encounter:
- Slower model downloads
- Rate limiting errors
- Inability to access certain restricted models
LLM4Decompile Models (for Pseudocode Refinement):
Available models for decompilation refinement:
| Model | Size | Re-executability | VRAM Required |
|---|---|---|---|
| llm4decompile-1.3b-v1.5 | 1.3B | 27.3% | 4GB+ |
| llm4decompile-6.7b-v1.5 | 6.7B | 45.4% | 8GB+ |
| llm4decompile-1.3b-v2 | 1.3B | 46.0% | 4GB+ |
| llm4decompile-6.7b-v2 | 6.7B | 52.7% | 8GB+ |
| llm4decompile-9b-v2 | 9B | 64.9% | 12GB+ |
| llm4decompile-22b-v2 | 22B | 63.6% | 24GB+ |
Note: Re-executability indicates the percentage of refined code that can be successfully recompiled. Higher values indicate better decompilation accuracy. For RTX 2060 (6GB VRAM), recommended models are:
- Ollama: llama3.2:3b or qwen3.5:4b
- LLM4Decompile: llm4decompile-1.3b-v2 or llm4decompile-6.7b-v2
If you used python setup.py:
- Edit
.envfile with your settings (if not already done) - Start Ollama server in a new terminal:
ollama serve - Run the application:
python webui\app.py - Access WebUI at: http://127.0.0.1:5000
If you used manual installation:
- Clone repository:
git clone https://github.com/Themehackers/REAA
cd REAA- Configure environment:
cp .env.example .env
# Edit .env with your settings- Start AI models (Windows Native):
# Terminal 1: Start Ollama
ollama serve
# Terminal 2: (Optional) Verify Ollama
curl http://localhost:11434/api/tags- Start Docker services:
# Terminal 3: Start & Build Ghidra API infrastructure
docker-compose build
docker-compose up -d- Run app.py
python webui/app.py- Access WebUI:
http://127.0.0.1:5000
API_KEY=ollama
API_BASE=http://localhost:11434/v1
MODEL_NAME=llama3.2:3b
OLLAMA_MAX_TOKENS=4096
OLLAMA_TEMPERATURE=0.7
LLM4DECOMPILE_MODEL_PATH=LLM4Binary/llm4decompile-1.3b-v2
LLM4DECOMPILE_DEVICE=auto
LLM4DECOMPILE_DTYPE=float16
LLM4DECOMPILE_MAX_MEMORY={0: "6GB"}
LLM4DECOMPILE_QUANTIZATION=
LLM4DECOMPILE_MAX_NEW_TOKENS=2048
GHIDRA_HOME=/opt/ghidra
GHIDRA_BIN=/opt/ghidra/support/analyzeHeadless
GHIDRA_SCRIPTS=/app/ghidra_scripts
GHIDRA_VERSION=12.0.4
DATA_DIR=/data/ghidra_projects
MAX_UPLOAD_SIZE=209715200
API_TITLE=Ghidra Headless REST API
API_VERSION=2.0.0
REDIS_URL=redis://localhost:6379/0
CELERY_BROKER_URL=redis://localhost:6379/0
CELERY_RESULT_BACKEND=redis://localhost:6379/0
CELERY_TASK_TIMEOUT=1800
LOG_LEVEL=INFO
ADMIN_USERNAME='It's up to you'
ADMIN_EMAIL='It's up to you'
ADMIN_PASSWORD='It's up to you'
ACTIVE_RE_ENABLED=true
ACTIVE_RE_SANDBOX_IMAGE=reaa/active-re-linux:latest
ACTIVE_RE_NETWORK_MODE=bridge
ACTIVE_RE_NETWORK_ISOLATED=true
ACTIVE_RE_TIMEOUT=300
ACTIVE_RE_MAX_MEMORY=2GB
ACTIVE_RE_MAX_CPU=2.0
FRIDA_SCRIPTS_DIR=/app/frida_scripts
FRIDA_DEVICE_TIMEOUT=60
ANGR_ENABLED=true
ANGR_LLM_MODEL=llama3.2:3b
ANGR_LLM_API_BASE=http://localhost:11434/v1
ANGR_LLM_API_KEY=
ANGR_SYMBOLIC_EXECUTION_TIMEOUT=300
PWNBG_ENABLED=true
PWNBG_GDB_PATH=/usr/bin/gdb
PWNBG_HEAP_ANALYSIS_ENABLED=true
PWNBG_MEMORY_VISUALIZATION_ENABLED=true
VECTOR_DB_TYPE=chromadb
VECTOR_DB_PATH=./data/vector_db
EMBEDDING_MODEL=sentence-transformers/all-MiniLM-L6-v2
RAG_TOP_K=5
RAG_SIMILARITY_THRESHOLD=0.7
ORCHESTRATOR_ENABLED=true
HUMAN_APPROVAL_REQUIRED=true
AGENT_MAX_TURNS=10
AGENT_TIMEOUT=120Each analysis generates comprehensive artifacts:
- functions.json: Function metadata with enhanced information
- xrefs.json: Cross-references and dependencies
- imports.json: Imported symbols
- strings.json: Extracted strings
- pseudocode/: Decompiled function code
- function_graph.json: Call relationship visualization
- memory_layout.json: Memory sections and permissions
- control_flow.json: Execution paths and basic blocks
- coverage.json: Analysis coverage metrics
- timeline.json: Analysis progress tracking
REAA includes a beautiful Command Line Interface (CLI) tool for interacting with all API endpoints directly from the terminal.
For detailed CLI documentation, see cli/README.md
# Activate virtual environment first
.venv\Scripts\activate
# Navigate to CLI directory
cd cli
# Install CLI in editable mode
pip install -e .Authentication Required:
Most CLI commands require authentication. You must login first:
# Register if you don't have an account
reaa auth register --username <username> --email <email> --password <password>
# Login with your credentials
reaa auth login --username <username> --password <password>
# Check if you're logged in
reaa auth me
# Logout when done
reaa auth logoutAPI Configuration:
# Set API URL
export REAA_API_URL="http://127.0.0.1:5000"
# Or use command
reaa config --url http://127.0.0.1:5000# Check system status
reaa status
# Upload and analyze binary
reaa analysis upload /path/to/binary.exe
reaa analysis jobs
reaa analysis status <job-id>
# Security analysis
reaa security analyze <job-id> --message "Analyze for vulnerabilities"
reaa security report <job-id>
# Active Reverse Engineering
reaa active-re plan /path/to/binary.exe --goal "vulnerability detection"
reaa active-re execute <job-id> /path/to/binary.exe
reaa active-re monitor <job-id> --duration 30
# RAG search
reaa rag search "buffer overflow" --n 5
reaa rag similar-functions "int main() { return 0; }" --n 5
# Orchestrator
reaa orchestrator plan /path/to/binary.exe --request "Comprehensive analysis"
reaa orchestrator execute <job-id> /path/to/binary.exe
reaa orchestrator tasks
# System monitoring
reaa system docker
reaa system gpu
reaa system logs ghidra-api --lines 100- auth: Authentication (register, login, logout, me)
- analysis: Binary analysis (upload, jobs, status, delete, download, memory, memory-hex, memory-analysis, memory-strings, memory-xref, memory-compare, memory-search)
- security: Security analysis (analyze, report, audit, metrics, scan)
- active-re: Active Reverse Engineering (plan, execute, monitor, chat)
- rag: RAG (search, similar-functions, vulnerabilities)
- orchestrator: Orchestrator (plan, execute, tasks, approve)
- r2: Radare2 integration (status, functions)
- system: System monitoring (docker, gpu, logs)
- remote: Remote collaboration (health, server-status, jobs, room-users, api-keys, create-key, delete-key)
- models: AI model management (list, current)
- settings: Configuration settings
- Beautiful terminal UI powered by Rich library
- Complete API coverage
- Interactive prompts
- Progress indicators
- Formatted tables and JSON output
- Auto-completion support
For detailed documentation, see cli/README.md
- File Upload: Drag-and-drop binary analysis
- Chat Interface: AI-powered analysis assistance
- Job Management: Track analysis progress
- Results Visualization: Interactive analysis results
- Ghidra Terminal: Direct Ghidra command access
- Radare2 Terminal: Radare2 CLI integration
- Security Analysis: Vulnerability detection
- Code Review: AI-assisted code review
- Timeline View: Analysis progress timeline
- Call Graph: Interactive function call visualization
- Memory Layout: Memory sections and permissions
- Control Flow: Execution paths and basic blocks
- Remote Collaboration: Share analysis sessions
- Real-time Sync: Live updates across users
- Job Sharing: Share decompilation results
- Refine All: Batch refine all pseudocode files
- Selective Refine: Choose specific files to refine
- LLM Integration: Uses llm4decompile model
- Execution Planning: Plan dynamic analysis strategies
- Sandbox Execution: Run binaries in isolated Docker containers
- Frida Scripts: Use pre-defined or custom Frida instrumentation
- Symbolic Execution: Explore execution paths with angr
- Enhanced Debugging: Use pwndbg for heap analysis
- Multi-Agent Coordination: Orchestrated analysis with AI agents
- Report Generation: Comprehensive security reports
- RAG Retrieval: Search analysis history for context
- Export Results: Download analysis artifacts
- Multiple Formats: JSON, text, and structured exports
POST /api/auth/register- Register new userPOST /api/auth/login- User loginPOST /api/auth/logout- User logoutGET /api/auth/me- Get current user info
POST /upload- Upload binary for analysisGET /jobs- List all jobsGET /status/{job_id}- Get job statusGET /api/jobs- List jobs (API)GET /api/jobs/{job_id}- Get job detailsDELETE /api/jobs/{job_id}- Delete jobGET /api/jobs/{job_id}/download- Download job artifactsPOST /api/jobs/cleanup- Clean up old jobsGET /api/jobs/{job_id}/functions- List job functionsGET /api/jobs/{job_id}/strings- List job stringsGET /api/jobs/{job_id}/imports- List job imports
POST /chat- Send chat messageGET /chat/history/{job_id}- Get chat historyDELETE /chat/history/{job_id}- Clear chat history
POST /security/analyze- Analyze security vulnerabilitiesGET /security/report/{job_id}- Get security reportDELETE /security/history/{job_id}- Clear security historyPOST /security/scan- Scan for vulnerabilities
GET /results/{job_id}/function/{addr}/refine- Refine single functionPOST /api/jobs/{job_id}/refine/batch- Batch refine all functionsGET /api/jobs/{job_id}/pseudocode/files- List pseudocode filesGET /api/jobs/{job_id}/pseudocode/<filename>- Get pseudocode file contentPOST /api/jobs/{job_id}/refine/selective- Selective refinement
GET /api/jobs/{job_id}/memory- Get memory layoutGET /api/jobs/{job_id}/memory/<section_name>/hex- Get hex dump of memory sectionGET /api/jobs/{job_id}/memory/analysis- Memory analysisGET /api/jobs/{job_id}/memory/strings- Extract strings from memoryGET /api/jobs/{job_id}/memory/<address>/xref- Get cross-references for addressGET /api/jobs/{job_id}/memory/compare/<section1>/<section2>- Compare memory sectionsPOST /api/jobs/{job_id}/memory/pattern/search- Search for byte patterns
GET /api/r2/status- Radare2 statusPOST /api/r2/analyze- Analyze binary with R2POST /api/r2/command- Execute R2 commandPOST /api/r2/load- Load binary in R2GET /api/r2/functions- List functionsGET /api/r2/strings- List stringsGET /api/r2/imports- List importsPOST /api/r2/autonomous- Autonomous analysisGET /api/r2/summary- Get analysis summaryGET/POST /api/r2/boundaries- Get/set boundariesGET/POST /api/r2/asm/config- Get/set ASM configPOST /api/r2/asm/preset- Set ASM presetPOST /api/r2/disasm/function- Disassemble functionPOST /api/r2/disasm/range- Disassemble rangePOST /api/r2/disasm/graph- Get disassembly graphPOST /api/asm/analyze- Analyze assemblyPOST /api/r2/test- Test Radare2 connection
POST /api/settings- Update settingsGET /api/models- List available modelsGET /api/models/current- Get current modelPOST /api/models/switch- Switch modelPOST /api/models/test- Test modelPOST /api/models/config- Configure modelGET /api/graph/{job_id}- Get graph visualizationGET /api/jobs/{job_id}/diff/<filename>- Get diff for pseudocode fileGET /pseudocode- Pseudocode page
GET /api/system/status- System statusGET /api/docker/status- Docker statusGET /api/docker/logs/{container_name}- Docker container logsGET /gpu/status- GPU statusGET /gpu/detailed- Detailed GPU info
GET /api/remote/health- Remote collaboration healthGET /api/remote/server/status- Remote server statusGET /api/remote/jobs- List remote jobsGET /api/remote/room/{job_id}/users- Get users in remote roomGET /api/remote/api-keys- List API keysPOST /api/remote/api-keys- Create API keyDELETE /api/remote/api-keys/<key>- Delete API key
POST /api/active-re/plan- Plan Active RE execution strategyPOST /api/active-re/execute- Execute binary with Frida instrumentationPOST /api/active-re/monitor- Monitor binary executionPOST /api/active-re/chat- Chat with Active RE agentPOST /api/orchestrator/plan- Plan analysis strategy with orchestratorPOST /api/orchestrator/execute- Execute orchestrated analysisGET /api/orchestrator/approvals- Get pending approval requestsPOST /api/orchestrator/approve- Approve or reject operationGET /api/orchestrator/tasks- Get all orchestrator tasksGET /api/orchestrator/tasks/{job_id}- Get specific task statusPOST /api/report/generate- Generate comprehensive security reportPOST /api/rag/search- Search RAG knowledge basePOST /api/rag/similar-functions- Find similar functionsPOST /api/rag/vulnerabilities- Search vulnerability patterns
Ollama GPU Issues:
# Check if GPU is detected
curl http://localhost:11434/api/tags
# If GPU not detected, ensure:
# 1. NVIDIA drivers are installed
# 2. CUDA is properly configured
# 3. Ollama is running with GPU supportPyTorch GPU Issues:
# Check CUDA availability
python -c "import torch; print(torch.cuda.is_available())"
# Check GPU name
python -c "import torch; print(torch.cuda.get_device_name(0))"
# Reinstall PyTorch if needed
pip uninstall torch torchvision torchaudio
pip install torch torchvision torchaudio --index-url https://download.pytorch.org/whl/cu124Model Download Issues:
# For Ollama, try:
ollama pull llama3.2:3b --verbose
# For llm4decompile, check:
# 1. Internet connection
# 2. Hugging Face access
# 3. Disk space (model is ~5GB)# Check worker status
docker-compose logs celery-worker
# Restart worker
docker-compose restart celery-worker- Build the Active RE Docker image:
cd docker/active-re
docker-compose build- Start the Active RE sandbox:
docker-compose up -d- Plan an execution strategy:
curl -X POST http://127.0.0.1:5000/api/active-re/plan \
-H "Content-Type: application/json" \
-d '{
"binary_path": "/path/to/binary.exe",
"analysis_goal": "vulnerability detection",
"binary_type": "exe"
}'- Execute with Frida instrumentation:
curl -X POST http://127.0.0.1:5000/api/active-re/execute \
-H "Content-Type: application/json" \
-d '{
"job_id": "your-job-id",
"binary_path": "/path/to/binary.exe"
}'- Monitor execution:
curl -X POST http://127.0.0.1:5000/api/active-re/monitor \
-H "Content-Type: application/json" \
-d '{
"job_id": "your-job-id",
"duration": 30
}'The orchestrator agent coordinates multiple analysis tools:
# Plan analysis strategy
curl -X POST http://127.0.0.1:5000/api/orchestrator/plan \
-H "Content-Type: application/json" \
-d '{
"binary_path": "/path/to/binary.exe",
"user_request": "Perform comprehensive security analysis",
"binary_type": "exe"
}'
# Execute orchestrated analysis
curl -X POST http://127.0.0.1:5000/api/orchestrator/execute \
-H "Content-Type: application/json" \
-d '{
"job_id": "your-job-id",
"binary_path": "/path/to/binary.exe",
"strategy": {...}
}'
# Check for pending approvals
curl http://127.0.0.1:5000/api/orchestrator/approvals
# Approve or reject operation
curl -X POST http://127.0.0.1:5000/api/orchestrator/approve \
-H "Content-Type: application/json" \
-d '{
"job_id": "your-job-id",
"approved": true
}'Search the knowledge base for similar functions and vulnerabilities:
# Search for similar functions
curl -X POST http://127.0.0.1:5000/api/rag/similar-functions \
-H "Content-Type: application/json" \
-d '{
"function_code": "int main() { return 0; }",
"n_results": 5
}'
# Search for vulnerability patterns
curl -X POST http://127.0.0.1:5000/api/rag/vulnerabilities \
-H "Content-Type: application/json" \
-d '{
"code_snippet": "strcpy(buffer, input)",
"n_results": 5
}'Generate comprehensive security reports:
curl -X POST http://127.0.0.1:5000/api/report/generate \
-H "Content-Type: application/json" \
-d '{
"job_id": "your-job-id",
"analysis_results": {...},
"output_format": "html"
}'This project is inspired by and builds upon the work of several innovative projects in the AI-powered reverse engineering space:
- ai-reverse-engineering by biniamf - Pioneering the integration of AI models with reverse engineering workflows
- r2dec-js by wargio - Advanced decompiler implementation for Radare2 with JavaScript-based analysis
- LLM4Decompile by albertan017 - Leveraging Large Language Models for decompilation and pseudocode refinement
These projects have demonstrated the potential of combining traditional reverse engineering tools with modern AI techniques, paving the way for more intelligent and automated analysis workflows. REAA aims to extend these concepts by integrating multiple tools (Ghidra, Radare2) and AI models (Ollama, LLM4Decompile) into a unified platform for comprehensive malware analysis and security research.