A list of open source reverse engineering tools with a focus on binary analysis
☆238Apr 16, 2024Updated last year
Alternatives and similar repositories for re-list
Users that are interested in re-list are comparing it to the libraries listed below
Sorting:
- A generic deobfuscator for PjOrion obfuscated python scripts☆122Feb 20, 2024Updated 2 years ago
- Decompiler Fuzzing Test with EMI mutation☆16Apr 23, 2020Updated 5 years ago
- simple Elf disassembler☆10Dec 30, 2014Updated 11 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆186Jul 28, 2022Updated 3 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- Tracing execution of python bytecode☆10Aug 2, 2019Updated 6 years ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Nov 12, 2017Updated 8 years ago
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 4 years ago
- A PCode Emulator for Ghidra.☆113Feb 7, 2021Updated 5 years ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆209Updated this week
- Raw binary firmware analysis software☆568Jun 6, 2024Updated last year
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Apr 15, 2023Updated 2 years ago
- SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.☆253Jan 16, 2026Updated 2 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Multi-tool reverse engineering collaboration solution.☆142Mar 27, 2024Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆72Oct 7, 2022Updated 3 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Apr 10, 2021Updated 4 years ago
- .lib file for linking against the NT CRT☆19Mar 18, 2022Updated 4 years ago
- ☆31Jan 12, 2022Updated 4 years ago
- Resources, tools about .net reverse engineering.☆86May 16, 2020Updated 5 years ago
- Scripts for the Ghidra.☆310Nov 1, 2021Updated 4 years ago
- ☆70Jul 4, 2024Updated last year
- Multiplayer snake game written at a single weekend☆13Jul 10, 2019Updated 6 years ago
- LLVM Without The ROP Gadgets!☆25Jan 9, 2024Updated 2 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Scripts I made to aid me in everyday reversing or just for fun...☆35Mar 25, 2019Updated 6 years ago
- Modification of LTE Firmwares on smartphones☆19Dec 31, 2020Updated 5 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- An Integrity-Check Monitoring Pintool☆58Nov 2, 2020Updated 5 years ago
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 9 months ago
- Binary ninja plugin for python compiled bytecode (pyc) disassembly☆33Mar 3, 2024Updated 2 years ago
- Small programs and scripts that do not require their own repositories☆139Feb 24, 2022Updated 4 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆95Oct 28, 2021Updated 4 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆62Sep 2, 2019Updated 6 years ago
- Intermediate Representation for Binary analysis and transformation☆350Jan 14, 2026Updated 2 months ago