binary-analysis
Here are 181 public repositories matching this topic...
It's nice if testing doesn't produce unnecessary artifacts after running with success but keeps relevant info on fail for further inspection.
Pytest should have a nice way of creating fixtures that can post-process a test based on whether it failed or not https://docs.pytest.org/en/latest/example/simple.html#making-test-result-information-available-in-fixtures
If a test fails, then keep the
LIEF - Library to Instrument Executable Formats
-
Updated
Nov 27, 2020 - C++
Program for determining types of files for Windows, Linux and MacOS.
-
Updated
Nov 19, 2020 - JavaScript
While the test_suite presented in #589 does work, it is still pretty simple and can be improved and enhanced.
- Add tests for gnutils and coreutils.
- Add necessary utilities so more complex programs can be compiled from sources.
- Integrate CMake, so one could write something like
make validateand the subset of test that is deemed necessary (for example everything withmint
Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a dynamic taint engine, AST representations of the x86, x86-64, ARM32 and AArch64 Instructions Set Architecture (ISA), SMT simplification passes, an SMT solver interface and, the last but not least, Python bindings.
-
Updated
Nov 26, 2020 - C++
The memtrace* sample clients use drutil_expand_rep_string, but the instrace* ones do not. This can confuse users: https://groups.google.com/g/dynamorio-users/c/HR4pX6lwP_I
Binary Analysis Platform
-
Updated
Nov 25, 2020 - OCaml
BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework
-
Updated
Nov 24, 2019 - Python
The OpenSource Disassembler
-
Updated
Nov 22, 2020 - C++
Automated static analysis tools for binary programs
-
Updated
Nov 16, 2020 - C++
Andromeda - Interactive Reverse Engineering Tool for Android Applications
-
Updated
Mar 14, 2020 - C++
DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.
-
Updated
Feb 14, 2020 - C
Attempting to decode any of the attached files with goblin::elf::Elf::parse crashes the process. Memory allocator runs out of virtual memory and the process is aborted.
Found via AFL.rs. Fuzzing harness: https://github.com/Shnatsel/goblin/blob/master/fuzz-afl/src/main.rs
DIE engine
-
Updated
Nov 27, 2020 - C++
Pintool example and PoC for dynamic binary analysis
-
Updated
Jun 30, 2015 - C++
The Kam1n0 Assembly Analysis Platform
-
Updated
Nov 16, 2020 - C
The dissection of a simple "hello world" ELF binary.
-
Updated
Mar 21, 2019 - Assembly
DyninstAPI: Tools for binary instrumentation, analysis, and modification.
-
Updated
Nov 25, 2020 - C
-
Updated
Aug 13, 2017
Binee: binary emulation environment
-
Updated
Nov 22, 2020 - Go
软件安全工程师技能表
-
Updated
Jul 18, 2017
The PE file analysis toolkit
-
Updated
Jun 8, 2020 - C
Components of a decompilation pipeline.
-
Updated
Jun 9, 2020 - Go
idenLib - Library Function Identification [This project is not maintained anymore]
-
Updated
Mar 17, 2019 - C++
Python core of avatar²
-
Updated
Nov 17, 2020 - Python
BootStomp: a bootloader vulnerability finder
-
Updated
Sep 28, 2018 - Python
《macOS软件安全与逆向分析》随书源码
-
Updated
Aug 9, 2017 - Objective-C
I noticed you have a plugin for Ghidra, but it is not the only one FOSS tool available.
Radare2 is a highly-portable cross-platform reverse engineering framework and a toolkit without dependencies. It has support for analyzing binaries, disassembling code, debugging programs, attaching to remote GDB/LLDB, WinDbg servers, rich plugin system (see r2pm), an
Binary Analysis Framework in Rust
-
Updated
Aug 20, 2020 - Rust
Improve this page
Add a description, image, and links to the binary-analysis topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the binary-analysis topic, visit your repo's landing page and select "manage topics."


Currently it's possible to list possible variable values in the CLI with
e search.in=?.But in
Vevisual configuration options navigator the feature is missing: