AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
-
Updated
Feb 22, 2026 - Python
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
The FLARE team's open-source tool to identify capabilities in executable files.
Symbolic execution tool
Toolkit to emulate firmware and analyse it for security vulnerabilities
BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework
A plugin for IDA that can help to analyze binary file, it can be based on commonly used AI big models such as OpenAI and DeepSeek.
Python core of avatar²
Framework for Automating Fuzzable Target Discovery with Static Analysis.
A comprehensive binary emulation and instrumentation platform.
BootStomp: a bootloader vulnerability finder
Ghidra Analysis Enhancer 🐉
FLARE Team's Binary Navigator
A modern, modular, and robust TUI hex editor.
Articles and tools related to research in the Apple environment (mainly macOS).
📡🐧 Linux kernel syscall implementation tracker
Obfuscator-llvm Control Flow Flattening Deobfuscator
Code and exercises for a workshop on z3 and angr
A research decompiler implemented as a Binary Ninja plugin.
A plugin for IDA that renames functions by system call numbers.
ScanCode.io is a server to script and automate software composition analysis with pipelines. This project is sponsored by the European Commission, NLnet NGI0, the Google Summer of Code, nexB and others generous sponsors!
Add a description, image, and links to the binary-analysis topic page so that developers can more easily learn about it.
To associate your repository with the binary-analysis topic, visit your repo's landing page and select "manage topics."