1
0
mirror of https://github.com/byReqz/blackmate.git synced 2024-11-27 13:31:51 +00:00
blackmate/categories/binary
2016-06-25 21:58:53 +08:00

28 lines
3.3 KiB
Plaintext

androguard|796.bf653d6|Reverse engineering, Malware and goodware analysis of Android applications and more.|https://github.com/androguard/androguard
angr|2973.97f400e|The next-generation binary analysis platform from UC Santa Barbara's Seclab.|https://github.com/angr/angr
binaryninja-python|13.83f59f7|Binary Ninja prototype written in Python.|https://github.com/Vector35/binaryninja-python
bindead|4504.67019b9|A static analysis tool for binaries|https://bitbucket.org/mihaila/bindead
bindiff|4.2.0|A comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.|http://www.zynamics.com/bindiff.html
binflow|4.c4140d7|POSIX function tracing. Much better and faster than ftrace.|https://github.com/elfmaster/binflow
binwally|4.0aabd8b|Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).|https://github.com/bmaia/binwally
bvi|1.4.0|A display-oriented editor for binary files operate like "vi" editor.|http://bvi.sourceforge.net/
bytecode-viewer|220.bca0f59|A Java 8/Android APK Reverse Engineering Suite.|https://github.com/Konloch/bytecode-viewer
detect-it-easy|50.6ae37ad|A program for determining types of files.|https://github.com/horsicq/Detect-It-Easy
dissector|1|This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.|http://packetstormsecurity.com/files/125972/Coloured-ELF-File-Dissector.html
ecfs|229.faf2fc2|Extended core file snapshot format.|https://github.com/elfmaster/ecfs
elfkickers|3.0a|Collection of ELF utilities (includes sstrip)|http://www.muppetlabs.com/~breadbox/software/elfkickers.html
elfparser|7.39d21ca|Cross Platform ELF analysis.|https://github.com/jacob-baines/elfparser
eresi|1263.c2b0bb6|The ERESI Reverse Engineering Software Interface.|https://github.com/thorkill/eresi
expimp-lookup|4.79a96c7|Looks for all export and import names that contain a specified string in all Portable Executable in a directory tree.|https://github.com/tr3w/ExpImp-Lookup
haystack|1756.61954a1|A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics.|https://github.com/trolldbois/python-haystack
hex2bin|2.1|Converts Motorola and Intel hex files to binary.|http://hex2bin.sourceforge.net/
imagejs|48.1faf262|Small tool to package javascript into a valid image file.|https://github.com/jklmnn/imagejs
oledump|0.0.22|Analyze OLE files (Compound File Binary Format). These files contain streams of data. This tool allows you to analyze these streams.|http://blog.didierstevens.com/programs/oledump-py/
oletools|0.44|Tools to analyze Microsoft OLE2 files.|http://www.decalage.info/python/oletools
packerid|1.4|Script which uses a PEiD database to identify which packer (if any) is being used by a binary.|http://handlers.sans.org/jclausing/
saruman|1.1a8e77d|ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection).|https://github.com/elfmaster/saruman
soot|2.5.0|A Java Bytecode Analysis and Transformation Framework.|http://www.sable.mcgill.ca/soot
swftools|0.9.2|A collection of SWF manipulation and creation utilities|http://www.swftools.org/
upx|3.91|Ultimate executable compressor.|http://upx.sourceforge.net/
valgrind|3.11.0|A tool to help find memory-management problems in programs|http://valgrind.org/