The FLARE team's open-source tool to identify capabilities in executable files.
-
Updated
Sep 3, 2025 - Python
The FLARE team's open-source tool to identify capabilities in executable files.
Symbolic execution tool
Toolkit to emulate firmware and analyse it for security vulnerabilities
A plugin for IDA that can help to analyze binary file, it can be based on commonly used AI big models such as OpenAI and DeepSeek.
BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework
Python core of avatar²
BootStomp: a bootloader vulnerability finder
Framework for Automating Fuzzable Target Discovery with Static Analysis.
A comprehensive binary emulation and instrumentation platform.
Code and exercises for a workshop on z3 and angr
An unofficial implementation of asm2vec as a standalone python package
A plugin for IDA that renames functions by system call numbers.
The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber
Ghidra Analysis Enhancer 🐉
FLARE Team's Binary Navigator
Articles and tools related to research in the Apple environment (mainly macOS).
Obfuscator-llvm Control Flow Flattening Deobfuscator
Binary Code Similarity Analysis (BCSA) Tool
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
REmatch, a complete binary diffing framework that is free and strives to be open source and community driven.
Add a description, image, and links to the binary-analysis topic page so that developers can more easily learn about it.
To associate your repository with the binary-analysis topic, visit your repo's landing page and select "manage topics."