Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Reverse Engineering
Browse 57 security tools
AI-powered malware analysis & threat research platform with chat interface.
Java decompiler for modern Java features up to Java 14.
An annual jeopardy-style capture-the-flag contest with challenges related to cybersecurity.
A Capture The Flag (CTF) platform for testing computer security skills
AI agent for in-depth binary analysis and reverse engineering assistance.
R&D firm providing cyber defense & operational tech for DoD and DHS.
AI-assisted vulnerability research and advanced offensive cyber tooling firm.
Agentic AI tool for automated malware reverse engineering & phishing analysis.
Plugin that decompiles malware PE files into readable C code using hybrid analysis.
Instructor-led training courses focused on counter-APT tactics and cyber defense.
Automated hardware reversing platform using robotics for embedded device analysis
Whole-system emulation environment for software dev, debugging, testing & security
Fast disassembler producing reassemblable assembly code using Datalog
A reverse engineering tool that extracts and organizes Samsung ODIN3 protocol messages from USB packet captures into human-readable files.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A reverse engineering framework with a focus on usability and code cleanliness
A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.
An open-source binary debugger for Windows with a comprehensive plugin system for malware analysis and reverse engineering.
steg86 is a steganographic tool that hides information within x86 and AMD64 binary executables without affecting their performance or file size.
An IDAPython script that generates YARA rules for basic blocks of the current function in IDA Pro, with automatic masking of relocation bytes and optional validation against file segments.
A collection of Python scripts that automate tasks and extend IDA Pro disassembler functionality for reverse engineering workflows.
BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.
An IDA Pro plugin that uses YARA rules to automatically detect cryptographic constants and patterns in binary files during reverse engineering analysis.
Interactive incremental disassembler with data/control flow analysis capabilities.