Boomerang Decompiler Logo

Boomerang Decompiler

0
Free
Visit Website

This is a fork of Boomerang, a general, open source (BSD licensed) machine code decompiler. Boomerang currently supports: architectures: x86 (IA-32 only), PPC, ST20 file formats: ELF, PE, DOS MZ, DOS/4GW LE, Mach-O high-level language output: C. Although there are pre-compiled packages available for release versions (master branch), it is currently recommended to build the development version (develop branch) of the decompiler from source. Building: Build status Test Coverage develop master Building prerequisites: - A 64 bit operating system (32 bit might or might not work, but it is not supported.) - A C++17 compiler (GCC 7+, Clang 6+, MSVC 2017+ are known to work) - CMake 3.13+ - Qt5 (Qt 5.12+ is known to work, earlier versions should also work) - Capstone 4.0.1+ - GNU bison 3.3+ - GNU flex 2.6+ - CCache 3.2+ (optional, for recompilation speed) - Doxygen 1.8+ (optional, for documentation) - Python 3 (optional, for regression tests) Building on Linux: On a Linux system you can build and install Boomerang with the usual cmake-make-make-install procedure. On a Debian-compatible system (e.g. Ubuntu) these commands will clone, build and install Boomerang: sudo apt-get install git build-e

FEATURES

ALTERNATIVES

A generator for YARA rules that creates rules from strings found in malware files while removing strings from goodware files.

A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.

A tool for malware analysts to search through base64-encoded samples and generate yara rules.

A tool for identifying sensitive secrets in public GitHub repositories

Automates the process of preparing Android APK files for HTTPS inspection

Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.

Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.

A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

PINNED