mirror of
https://github.com/byReqz/blackmate.git
synced 2024-11-01 11:33:13 +00:00
28 lines
3.3 KiB
Plaintext
28 lines
3.3 KiB
Plaintext
|
androguard|796.bf653d6|Reverse engineering, Malware and goodware analysis of Android applications and more.|https://github.com/androguard/androguard
|
||
|
angr|2973.97f400e|The next-generation binary analysis platform from UC Santa Barbara's Seclab.|https://github.com/angr/angr
|
||
|
binaryninja-python|13.83f59f7|Binary Ninja prototype written in Python.|https://github.com/Vector35/binaryninja-python
|
||
|
bindead|4504.67019b9|A static analysis tool for binaries|https://bitbucket.org/mihaila/bindead
|
||
|
bindiff|4.2.0|A comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.|http://www.zynamics.com/bindiff.html
|
||
|
binflow|4.c4140d7|POSIX function tracing. Much better and faster than ftrace.|https://github.com/elfmaster/binflow
|
||
|
binwally|4.0aabd8b|Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).|https://github.com/bmaia/binwally
|
||
|
bvi|1.4.0|A display-oriented editor for binary files operate like "vi" editor.|http://bvi.sourceforge.net/
|
||
|
bytecode-viewer|220.bca0f59|A Java 8/Android APK Reverse Engineering Suite.|https://github.com/Konloch/bytecode-viewer
|
||
|
detect-it-easy|50.6ae37ad|A program for determining types of files.|https://github.com/horsicq/Detect-It-Easy
|
||
|
dissector|1|This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.|http://packetstormsecurity.com/files/125972/Coloured-ELF-File-Dissector.html
|
||
|
ecfs|229.faf2fc2|Extended core file snapshot format.|https://github.com/elfmaster/ecfs
|
||
|
elfkickers|3.0a|Collection of ELF utilities (includes sstrip)|http://www.muppetlabs.com/~breadbox/software/elfkickers.html
|
||
|
elfparser|7.39d21ca|Cross Platform ELF analysis.|https://github.com/jacob-baines/elfparser
|
||
|
eresi|1263.c2b0bb6|The ERESI Reverse Engineering Software Interface.|https://github.com/thorkill/eresi
|
||
|
expimp-lookup|4.79a96c7|Looks for all export and import names that contain a specified string in all Portable Executable in a directory tree.|https://github.com/tr3w/ExpImp-Lookup
|
||
|
haystack|1756.61954a1|A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics.|https://github.com/trolldbois/python-haystack
|
||
|
hex2bin|2.1|Converts Motorola and Intel hex files to binary.|http://hex2bin.sourceforge.net/
|
||
|
imagejs|48.1faf262|Small tool to package javascript into a valid image file.|https://github.com/jklmnn/imagejs
|
||
|
oledump|0.0.22|Analyze OLE files (Compound File Binary Format). These files contain streams of data. This tool allows you to analyze these streams.|http://blog.didierstevens.com/programs/oledump-py/
|
||
|
oletools|0.44|Tools to analyze Microsoft OLE2 files.|http://www.decalage.info/python/oletools
|
||
|
packerid|1.4|Script which uses a PEiD database to identify which packer (if any) is being used by a binary.|http://handlers.sans.org/jclausing/
|
||
|
saruman|1.1a8e77d|ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection).|https://github.com/elfmaster/saruman
|
||
|
soot|2.5.0|A Java Bytecode Analysis and Transformation Framework.|http://www.sable.mcgill.ca/soot
|
||
|
swftools|0.9.2|A collection of SWF manipulation and creation utilities|http://www.swftools.org/
|
||
|
upx|3.91|Ultimate executable compressor.|http://upx.sourceforge.net/
|
||
|
valgrind|3.11.0|A tool to help find memory-management problems in programs|http://valgrind.org/
|