binee
Binary analyzer
A binary emulation environment that introspects system interactions to analyze malware behavior.
Binee: binary emulation environment
507 stars
25 watching
73 forks
Language: Go
last commit: over 2 years ago analysisbinarybinary-analysisemulationhooksmalwaremockstatic-analysistestingunicorn-emulator
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An alpha version command-line tool for malware analysis and binary transformation | 687 |
| | A dynamic binary analysis and emulation framework for a wide range of architectures and operating systems. | 893 |
| | A tool that gathers and analyzes information about Windows updates, binaries, and symbols to aid in their analysis. | 156 |
| | An analysis tool for estimating the likelihood of binary compression or encryption | 43 |
| | A comprehensive toolkit for analyzing and understanding binary programs | 2,079 |
| | A framework for analyzing suspicious binaries by configuring analysis environments and executing them in a sandboxed space | 197 |
| | A tool to quickly inspect and analyze binary executables by parsing and coloring their contents. | 1,714 |
| | A C# wrapper around the Yara pattern matching library for detecting malware and analyzing binaries | 36 |
| | A tool for collaborative reverse engineering of binary files using multiple disassemblers and decompilers. | 135 |
| | A toolset for analyzing binary code with IDA integration and support for value, taint analysis, type reconstruction, and detection of use-after-free and double-free bugs. | 1,706 |
| | A framework for reverse-engineering and analyzing binary executables by disassembling and emulating them. | 944 |
| | An all-in-one malware analysis tool that provides detailed information about suspicious files and executables. | 1,348 |
| | An interactive platform for analyzing and modifying binary firmware | 1,882 |
| | An analysis tool for validating binary executables and providing security results | 784 |
| | A platform for emulating and analyzing binary behavior at the system call level. | 409 |