Malware Analysis
binary-conversion

Other Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

xocopy

0 (0)

Copy executables with execute, but no read permission on Unix systems.

A tool that scans a corpus of malware and builds a YARA rule to detect similar code sections.

Ropper Logo

Ropper

0 (0)

Ropper is a tool for analyzing binary files and searching for gadgets to build rop chains for different architectures.

Online Java decompiler tool with support for modern Java features.

PLASMA Logo

PLASMA

0 (0)

PLASMA is an interactive disassembler with support for various architectures and formats, offering a Python API for scripting.

Binkit Logo

Binkit

0 (0)

Cybersecurity tool merging DarunGrim's analysis algorithms, currently in internal testing for official release.

A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.

A Python script that converts shellcode into a PE32 or PE32+ file.

Krakatau provides an assembler and disassembler for Java bytecode, supporting conversion, creation, examination, comparison, and decompilation of Java binaries.

A command-line utility for examining Objective-C runtime information in Mach-O files and generating class declarations.

A tool for malware analysts to search through base64-encoded samples and generate yara rules.

Kaitai Struct is a declarative language for describing binary data structures.

FLARE Obfuscated String Solver (FLOSS) automatically extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.