Boomerang Decompiler Logo

Boomerang Decompiler

Visit Website

This is a fork of Boomerang, a general, open source (BSD licensed) machine code decompiler. Boomerang currently supports: architectures: x86 (IA-32 only), PPC, ST20 file formats: ELF, PE, DOS MZ, DOS/4GW LE, Mach-O high-level language output: C. Although there are pre-compiled packages available for release versions (master branch), it is currently recommended to build the development version (develop branch) of the decompiler from source. Building: Build status Test Coverage develop master Building prerequisites: - A 64 bit operating system (32 bit might or might not work, but it is not supported.) - A C++17 compiler (GCC 7+, Clang 6+, MSVC 2017+ are known to work) - CMake 3.13+ - Qt5 (Qt 5.12+ is known to work, earlier versions should also work) - Capstone 4.0.1+ - GNU bison 3.3+ - GNU flex 2.6+ - CCache 3.2+ (optional, for recompilation speed) - Doxygen 1.8+ (optional, for documentation) - Python 3 (optional, for regression tests) Building on Linux: On a Linux system you can build and install Boomerang with the usual cmake-make-make-install procedure. On a Debian-compatible system (e.g. Ubuntu) these commands will clone, build and install Boomerang: sudo apt-get install git build-e

FEATURES

ALTERNATIVES

Repository of scripts, signatures, and IOCs related to various malware analysis topics.

PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.

A tool that executes programs in memory from various sources

A Django web interface for managing Yara rules with features like search, categorization, and bulk edits.

A Burp Suite plugin for automatically adding XSS and SQL payload to fuzz

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.

Copy executables with execute, but no read permission on Unix systems.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved