Python API for interfacing with arbitrary executables
-
Updated
Jan 12, 2018 - Python
Python API for interfacing with arbitrary executables
Smeagle Python - generate facts from ELF with debug
binary similarity using Deep learning
Server providing binaries feature extraction through a REST API
A cross-lingual basic block embedding model using LSTM
Scripts/C program used to solve SANS KringleCon Holiday Hack Challenge
Direct connector for Kam1n0 batch mode
A Radare2 based Python module for Binary Analysis and Reverse Engineering.
Count statistics of opcodes and register / arguments in ELF binaries
Implementation of the packing detection heuristic from the paper "Packed PE File Detection for Malware Forensics" of Han et al.
Remove junk bytes from malware binaries
Visual reverse engineering tool showing some of the current techniques.
Repository for a functional attack on miasm's default symbolic execution engine plus solutions!
Ghidra Analysis Enhancer 🐉 Python3 version.
Experimental project to locate symbol interpositions in Debian packages
A Rust crate to provide a unified oracle for obtaining function, symbol, branching, etc., information about a particular binary
Add a description, image, and links to the binary-analysis topic page so that developers can more easily learn about it.
To associate your repository with the binary-analysis topic, visit your repo's landing page and select "manage topics."