reko

Binary analyzer

A binary decompiler that analyzes and reverse-engineers machine code binaries from various processor architectures.

Reko is a binary decompiler.

GitHub

2k stars
76 watching
253 forks
Language: C#
last commit: 13 days ago
Linked from 1 awesome list

aarch64armdecompiledecompilerdecompiler-enginedisassembledisassemblerdotnetm68kreverse-engineeringrisc-vx86x86-64

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
redasmorg/redasm An open-source tool for reverse-engineering and disassembling binary code on various architectures 1,570
reb311ion/replica An enhancement tool for Ghidra's binary analysis capabilities 287
martyx00/collare A tool for collaborative reverse engineering of binary files using multiple disassemblers and decompilers. 134
binaryanalysisplatform/bap A comprehensive toolkit for analyzing and understanding binary programs 2,068
redballoonsecurity/ofrak An interactive platform for analyzing and modifying binary firmware 1,871
tklengyel/drakvuf A system for analyzing arbitrary binaries without installing additional software within a virtual machine 1,063
kubkon/zig-objdump An utility for disassembling and examining Zig binaries 11
zeropointdynamics/zelos A platform for emulating and analyzing binary behavior at the system call level. 408
vivisect/vivisect A framework for reverse-engineering and analyzing binary executables by disassembling and emulating them. 939
binref/refinery A command-line toolkit for analyzing binary data 664
momalab/icsref A tool for analyzing and extracting information from industrial control systems binaries 162
lunixbochs/usercorn A dynamic binary analysis and emulation framework for a wide range of architectures and operating systems. 891
cmu-sei/pharos Automated analysis tool for understanding and recovering program structure from compiled binaries 1,557
peeyush1234/reek.tmbundle A bundle for TextMate that integrates a static code analysis tool 2
carbonblack/binee A binary emulation environment that introspects system interactions to analyze malware behavior. 503