UNIX-like reverse engineering framework and command-line toolset
-
Updated
Sep 26, 2024 - C
UNIX-like reverse engineering framework and command-line toolset
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Program for determining types of files for Windows, Linux and MacOS.
LIEF - Library to Instrument Executable Formats
Dynamic Instrumentation Tool Platform
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
The FLARE team's open-source tool to identify capabilities in executable files.
Symbolic execution tool
State-of-the-art native debugging tools
Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode
DIE engine
Binary Analysis Platform
EMBA - The firmware security analyzer
BinAbsInspector: Vulnerability Scanner for Binaries
Public API, examples, documentation and issues for Binary Ninja
Automated static analysis tools for binary programs
DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.
BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework
Add a description, image, and links to the binary-analysis topic page so that developers can more easily learn about it.
To associate your repository with the binary-analysis topic, visit your repo's landing page and select "manage topics."