An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
-
Updated
Jun 16, 2024 - C++
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Program for determining types of files for Windows, Linux and MacOS.
Performant type-checking for python.
Security analysis tool for EVM bytecode. Supports smart contracts built for Ethereum, Hedera, Quorum, Vechain, Rootstock, Tron and other EVM-compatible blockchains.
Symbolic execution tool
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
UNIX-like reverse engineering framework and command-line toolset.
DIE engine
A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
Binary Analysis Platform
Static analyzer for C/C++ based on the theory of Abstract Interpretation.
Quickly find differences and similarities in disassembled code
Static Code Analysis - 静态代码分析
Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM.
cwe_checker finds vulnerable patterns in binary executables
Tai-e assignments for static program analysis
A LLVM-based static analysis framework.
T.J. Watson Libraries for Analysis, with frontends for Java, Android, and JavaScript, and may common static program analyses
Add a description, image, and links to the program-analysis topic page so that developers can more easily learn about it.
To associate your repository with the program-analysis topic, visit your repo's landing page and select "manage topics."