DECAF
Binary analyzer
A whole-system dynamic binary analysis platform that enables the analysis of malware and malicious code execution
DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.
805 stars
61 watching
168 forks
Language: C
last commit: 4 months ago
Linked from 2 awesome lists
binary-analysistaint-analysis
Related projects:
Repository | Description | Stars |
---|---|---|
droidefense/engine | An Android malware analysis framework that generates detailed reports on executable code behavior | 473 |
tklengyel/drakvuf | A system for analyzing arbitrary binaries without installing additional software within a virtual machine | 1,063 |
programa-stic/barf-project | A framework for automated and assisted binary analysis and reverse engineering | 1,411 |
binaryanalysisplatform/bap | A comprehensive toolkit for analyzing and understanding binary programs | 2,068 |
drafproject/draf | An analysis and decision support framework for analyzing energy demand profiles and optimizing local energy systems. | 14 |
binref/refinery | A command-line toolkit for analyzing binary data | 664 |
zeropointdynamics/zelos | A platform for emulating and analyzing binary behavior at the system call level. | 408 |
airbus-seclab/bincat | A toolset for analyzing binary code with IDA integration and support for value, taint analysis, type reconstruction, and detection of use-after-free and double-free bugs. | 1,691 |
redballoonsecurity/ofrak | An interactive platform for analyzing and modifying binary firmware | 1,871 |
fuzzinglabs/sierra-analyzer | Analyzes and decomposes binary files used by the Sierra blockchain network | 7 |
reb311ion/replica | An enhancement tool for Ghidra's binary analysis capabilities | 287 |
cristianzsh/freki | A platform for analyzing malware and performing reverse engineering on binary files | 422 |
momalab/icsref | A tool for analyzing and extracting information from industrial control systems binaries | 162 |
carbonblack/binee | A binary emulation environment that introspects system interactions to analyze malware behavior. | 503 |
certcc/kaiju | A binary analysis framework extension for reverse engineering software | 270 |