DECAF

Binary analyzer

A whole-system dynamic binary analysis platform that enables the analysis of malware and malicious code execution

DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.

GitHub

808 stars
61 watching
168 forks
Language: C
last commit: 29 days ago
Linked from 2 awesome lists

binary-analysistaint-analysis

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
droidefense/engine An Android malware analysis framework that generates detailed reports on executable code behavior 476
tklengyel/drakvuf A system for analyzing arbitrary binaries without installing additional software within a virtual machine 1,071
programa-stic/barf-project A framework for automated and assisted binary analysis and reverse engineering 1,413
binaryanalysisplatform/bap A comprehensive toolkit for analyzing and understanding binary programs 2,079
drafproject/draf An analysis and decision support framework for analyzing energy demand profiles and optimizing local energy systems. 14
binref/refinery An alpha version command-line tool for malware analysis and binary transformation 687
zeropointdynamics/zelos A platform for emulating and analyzing binary behavior at the system call level. 409
airbus-seclab/bincat A toolset for analyzing binary code with IDA integration and support for value, taint analysis, type reconstruction, and detection of use-after-free and double-free bugs. 1,706
redballoonsecurity/ofrak An interactive platform for analyzing and modifying binary firmware 1,882
fuzzinglabs/sierra-analyzer Analyzes and decomposes binary files used by the Sierra blockchain network 10
reb311ion/replica An enhancement tool for Ghidra's binary analysis capabilities 289
cristianzsh/freki A platform for analyzing malware and performing reverse engineering on binary files 424
momalab/icsref A tool for analyzing and extracting information from industrial control systems binaries 162
carbonblack/binee A binary emulation environment that introspects system interactions to analyze malware behavior. 507
certcc/kaiju A binary analysis framework extension for reverse engineering software 272