A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.
ICSREF is a modular framework that automates the reverse engineering process of CODESYS binaries compiled with the CODESYS v2 compiler. It can perform core analysis of arbitrary PRG programs, including: * Delimitation of binary blobs (i.e., functions/routines) * Identification of calls to dynamic libraries * Identification of calls to static libraries (other than CODESYS libraries) by Tasos Keliris @koukouviou Cite us! If you find our work interesting and use it in your (academic or not) research, please cite our NDSS'19 paper describing ICSREF: @inproceedings{keliris2019icsref, title={{ICSREF}: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries}, author={Keliris, A. and Maniatakos, M.}, booktitle={Network and Distributed System Security Symposium (NDSS)}, year={2019} }
A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.
Standalone graphical utility for viewing Java source codes from ".class" files.
A simple JWT token brute force cracker
A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.
Search gadgets on binaries to facilitate ROP exploitation.
An open-source binary debugger for Windows with a comprehensive plugin system for malware analysis and reverse engineering.