Triton is a dynamic binary analysis library that provides internal components for building program analysis tools, automating reverse engineering, performing software verification, and emulating code. It offers dynamic symbolic execution, dynamic taint analysis, AST representation of various ISAs, expressions synthesis, SMT simplification passes, lifting to LLVM, and interfaces with Z3 and Bitwuzla solvers. It also includes C++ and Python APIs for ease of use.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A portable version of XSSHunter.com for finding and exploiting Cross-Site Scripting (XSS) vulnerabilities.
Powerful debugging tool with extensive features and extensions for memory dump analysis and crash dump analysis.
Educational resources for reverse engineering tutorials by lena151.
A tool for malware analysts to search through base64-encoded samples and generate yara rules.
Multi-cloud antivirus scanning API with CLAMAV and YARA support for AWS S3, Azure Blob Storage, and GCP Cloud Storage.
A tool that scans a corpus of malware and builds a YARA rule to detect similar code sections.
Tool for decompressing malware samples to run Yara rules against them.
Checksec is a bash script to check the properties of executables like PIE, RELRO, Canaries, ASLR, Fortify Source.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.