Category: Reverse Engineering
Androguard Reverse engineering, Malware, and goodware analysis of Android applications … and more (ninja !) Features Androguard is a full Python tool to play with Android files. DEX, ODEX APK...
Pigaios Pigaios (‘πηγαίος’, Greek for ‘source’ as in ‘source code’) is a tool for diffing/matching source codes directly against binaries. The idea is to point a tool to a code...
scanmem is a debugging utility designed to isolate the address of an arbitrary variable in an executing process. scanmem simply needs to be told the pid of the process and...
BIOSUtilities Various BIOS Utilities for Modding/Research Dell HDR Module Extractor Description Extracts and unpacks the SPI/BIOS modules from Dell HDR executables. After extraction, the HDR image is automatically unpacked into...
Shellcode Compiler Shellcode Compiler is a program that compiles C/C++ style code into a small, position-independent and NULL-free shellcode for Windows. It is possible to call any Windows API function...
Trinity: Linux system call fuzzer What is it? The basic idea is fairly simple. As ‘fuzz testing‘ suggests, we call syscalls at random, with random arguments. Not an original idea,...
What is BinCAT? A static Binary Code Analysis Toolkit, designed to help reverse engineers, directly from IDA. It features: value analysis (registers and memory) taint analysis type reconstruction and propagation backward and...
Miasm is a free and open-source (GPLv2) reverse engineering framework. Miasm aims to analyze/ modify/generate binary programs. Here is a non-exhaustive list of features: Opening / modifying / generating PE...
Lucky CAT – Crash All the Things! What is Lucky CAT? Lucky CAT (Crash All the Things!) is a distributed fuzzing testing suite with an easy to use web interface. It allows...
IDAMagicStrings An IDA Python plugin to extract information from string constants. The current version of the plugin is able to: Display functions to source files relationships (in a tree and in a plain...
Welcome to salt, a tool to reverse and learn kernel heap memory management. It can be useful to develop an exploit, to debug your own kernel code, and, more importantly, to...
Angora Angora is a mutation-based coverage guided fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic execution. Angora consists of a fuzzer,...
UEFI Firmware Parser The UEFI firmware parser is a simple module and set of scripts for parsing, extracting, and recreating UEFI firmware volumes. This includes parsing modules for BIOS, OptionROM,...
The Hex-Rays Decompiler plugin for better code navigation in RE process. CodeXplorer automates code REconstruction of C++ applications or modern malware like Stuxnet, Flame, Equation, Animal Farm. The CodeXplorer plugin...
r2kit Overview r2kit is a set of scripts to help with a workflow for malware code analysis using radare. sessionstarter.py – Run from inside an r2 session to auto rename...