Direct connector for Kam1n0 batch mode
-
Updated
Feb 26, 2020 - Python
Direct connector for Kam1n0 batch mode
Tool to inspect data by switching between encoding.
UNIX-like reverse engineering framework and command-line toolset
A binary-level cognition engine for MindsEye. Decode, label, map, and traverse binary as time-patterns. Builds signatures, provenance, and time-aware meters for advanced ML and agentic systems.
Project aiming at analyzing a binary file on the Portable Executable (PE) format.
Native Ghidra Decompiler for r2
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse engineers, and low-level programmers.
Divas is a hobbyist's approach into disassembling AMD64 based ELF and PE Executables which can read section header and Executable-specfic parameters in a compact manner.
Minimal C++ library for parsing ELF64 binaries with no external dependencies.
Rust binding for Intel XED
WIP
Use Jupyter and Ghidra to extract binary features and search for potential vulnerabilities
Tiny and simple disassembler using gapstone
Challenge your AI's algorithmic thinking with GTA Benchmark! Reverse-engineer transformations from input-output pairs. Join now! 🐙🚀
Binary Ninja plugin to extract binary features.
An advanced Windows shell code loader and generator toolset featuring XOR encryption, debug protection, and GUI capabilities for penetration testing.
Identify fields and their hierarchy of programs's input by Dynamic Data Flow Tracking 使用动态污点分析方法还原二进制程序的具体输入中的字段及层次结构
Add a description, image, and links to the binary-analysis topic page so that developers can more easily learn about it.
To associate your repository with the binary-analysis topic, visit your repo's landing page and select "manage topics."