The Binary Analysis and Reverse engineering Framework (BARF) is an open source binary analysis framework that supports a wide range of binary code analysis tasks in the information security discipline. It offers instruction lifting from multiple architectures, binary translation to an intermediate representation, an extensible framework for code analysis plugins, and interoperation with external tools like debuggers and SMT solvers.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
A program to manage yara ruleset in a database with support for different databases and configuration options.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A tool designed to handle archive file data and augment Yara's capabilities.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.