The Binary Analysis and Reverse engineering Framework (BARF) is an open source binary analysis framework that supports a wide range of binary code analysis tasks in the information security discipline. It offers instruction lifting from multiple architectures, binary translation to an intermediate representation, an extensible framework for code analysis plugins, and interoperation with external tools like debuggers and SMT solvers.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.
Cybersecurity tool merging DarunGrim's analysis algorithms, currently in internal testing for official release.
A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
Repository of scripts, signatures, and IOCs related to various malware analysis topics.
A sandbox for quickly sandboxing known or unknown families of Android Malware
A web-based manager for Yara rules, allowing for storage, editing, and management of Yara rules.
A Python script that finds endpoints in JavaScript files to identify potential security vulnerabilities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.