Loading...
Browse 116 binary analysis tools
SCA tool for managing security, quality, and license risks in open source code
SCA tool for managing security, quality, and license risks in open source code
Open source vulnerability intelligence engine analyzing 270M+ components
Open source vulnerability intelligence engine analyzing 270M+ components
Platform for chip security testing and binary security analysis
Trace-based disassembler for analyzing obfuscated and packed binaries
Trace-based disassembler for analyzing obfuscated and packed binaries
Extracts mathematical algorithms from binary programs for CPS analysis.
Extracts mathematical algorithms from binary programs for CPS analysis.
Fast disassembler producing reassemblable assembly code using Datalog
Fast disassembler producing reassemblable assembly code using Datalog
Reverse engineering service for identifying vulnerabilities in software
Reverse engineering service for identifying vulnerabilities in software
Mobile app security testing platform for Android and iOS apps
Mobile app security testing platform for Android and iOS apps
SAST tool that scans source code and binaries for security vulnerabilities
SAST tool that scans source code and binaries for security vulnerabilities
SAST tool using virtual compilers to analyze source code for vulnerabilities
SAST tool using virtual compilers to analyze source code for vulnerabilities
AI-driven SAST tool using virtual compilers for source code analysis
AI-driven SAST tool using virtual compilers for source code analysis
Unified engine correlating static & runtime analysis for app security
Unified engine correlating static & runtime analysis for app security
Identifies cryptographic algorithms and libraries in code for compliance
Identifies cryptographic algorithms and libraries in code for compliance
AI-powered reverse engineering tool for analyzing compiled binaries
AI-powered reverse engineering tool for analyzing compiled binaries
Platform for vulnerability detection in firmware, binaries, and SBOMs
Platform for vulnerability detection in firmware, binaries, and SBOMs
Full-cycle app security platform with SAST, DAST, MAST, SCA & binary analysis
Full-cycle app security platform with SAST, DAST, MAST, SCA & binary analysis
A binary analysis platform for analyzing binary programs
A binary analysis platform for analyzing binary programs
A powerful reverse engineering framework
A reverse engineering framework with a focus on usability and code cleanliness
A reverse engineering framework with a focus on usability and code cleanliness
An open-source binary debugger for Windows with a comprehensive plugin system for malware analysis and reverse engineering.
An open-source binary debugger for Windows with a comprehensive plugin system for malware analysis and reverse engineering.
A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.
A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.
A malware/botnet analysis framework with a focus on network analysis and process comparison.
A malware/botnet analysis framework with a focus on network analysis and process comparison.
ConventionEngine is a Yara rule collection that analyzes PE files by examining PDB paths for suspicious keywords, terms, and anomalies that may indicate malicious software.
ConventionEngine is a Yara rule collection that analyzes PE files by examining PDB paths for suspicious keywords, terms, and anomalies that may indicate malicious software.
Embeddable Yara library for Java with support for loading rules and scanning data.
Embeddable Yara library for Java with support for loading rules and scanning data.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance