cwe_checker Logo

cwe_checker

0
Free
Visit Website

cwe_checker is a suite of checks to detect common bug classes such as Null pointer dereferences and buffer overflows. These bug classes are formally known as Common Weakness Enumerations (CWEs). The checks are based on a variety of anaylsis techniques ranging from simple heuristics to abstract interpretation-based data-flow analysis. Its main goal is to aid analysts to quickly find potentially vulnerable code paths. Its main focus are ELF binaries that are commonly found on Linux and Unix operating systems. The cwe_checker uses Ghidra to disassemble binaries into one common intermediate representation and implements its own analyses on this IR. Hence, the analyses can be run on most CPU architectures that Ghidra can disassemble, which makes the cwe_checker a valuable tool for firmware analysis. The following arguments should convince you to give cwe_checker a try: it is very easy to set up, just build the Docker container! it analyzes ELF binaries of several CPU architectures including x86, ARM, MIPS, and PPC it is extensible due to its plugin-based architecture it is configurable, e.g. apply analyses to new APIs view results annotated in Ghidra

FEATURES

ALTERNATIVES

A Windows Kernel driver intentionally vulnerable to help improve skills in kernel-level exploitation.

Mitigate security concerns of Dependency Confusion supply chain security risks.

A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.

A tool for dynamic analysis of mobile applications in a controlled environment.

Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

A deliberately weak and insecure implementation of GraphQL for testing and practicing GraphQL security

A full python tool for analyzing Android files with various functionalities.

Revelo is an experimental Javascript deobfuscator tool with features to analyze and deobfuscate Javascript code.

PINNED