decompiler-explorer
binaryninja-api
decompiler-explorer | binaryninja-api | |
---|---|---|
18 | 9 | |
1,831 | 819 | |
2.3% | 2.3% | |
8.4 | 9.7 | |
6 days ago | 3 days ago | |
Python | C++ | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
decompiler-explorer
-
Dogbolt Decompiler Explorer
Can I just say, thanks to the person who posted this for waiting until this week to do so. (Side note: I suspect it was due to the recent coverage from C++ Weekly which is a great resource: https://www.youtube.com/watch?v=h3F0Fw0R7ME)
As recently as last week we had some horrible performance problems but it looks like the queue (https://dogbolt.org/queue) is mostly still fine! Other than the long pole of a few of the decompilers being backed up, things are humming along quite smoothly! Josh + Glenn have done some great work on it! (https://github.com/decompiler-explorer/decompiler-explorer/c...)
-
Revamping Binary Analysis with Sampling and Probabilistic Inference
(dogbolt.org, not .com by the way.)
-
IDA Pro 8.3 released.
Also check out this comparison tool https://dogbolt.org/ (https://github.com/decompiler-explorer/decompiler-explorer) - it's a clear illustration that tool effectiveness is highly dependent on the specific binary input and task complexity
-
How to determine original language an .exe was coded with?
The c++-looking code you see is rebuild from the disasm, e.g for clarity, it's supposed to make the low level code more readable, so it does not mean anything about the language. (aside: several other product do that, see https://dogbolt.org/)
- MCU Firmware unpacking, decrypting? Find Security Keys, Checksums, Memory Map
- IDA Pro 8.0 released.
- Decompiler Explorer – Compare tools on the forefront of static analysis from your web browser
binaryninja-api
- The Hiew Hex Editor
-
[Media] I'm currently learning Rust. Out of curiosity, I opened the resulting binary as a text file, and among the garbled text characters, I saw this weird text. Is this normal or is there something wrong with the compiled binary? It's the "Hello, World!" sample program and it executes normally.
If you really want to poke around in the binary, you can use a decompiler like IDA, Ghidra, or Binary Ninja's free version.
-
Ida Free
Still $$$ for crippled functionality.
As an alternative, https://binary.ninja is gaining traction at work.
- Binary Ninja
- Public API, examples, documentation and issues for Binary Ninja
-
Looking for this software (If off-topic, I'll delete)
Possibly binary ninja
-
Teaching A Machine To Identify Vulnerabilities (Part 1)
As I said, a regular text editor won’t do for reading a binary file, so I needed to choose a disassembler to break the challenge binaries out into their basic blocks. I chose to use Binary Ninja because it has a very easy-to-use Python API, and it’s hobbyist-level cheap (for comparison, the industry-standard disassembler is IDA Pro, which they will sell to you for roughly an arm, and continue to pick off your fingers and toes with renewal fees). I began by writing a quick script to go through a single binary and print out the opcodes it encountered in each block, just to validate that I was able to acquire the data I wanted.
-
Why do most hackers base their personality around hacking?
It’s an awesome reverse engineering tool (https://binary.ninja). Has really nice api support so you can basically automate anything and make plugins for custom architectures and stuff like that.
-
Introducing Decompiler Explorer (🐶⚡️)
If you agree, there is a GitHub issue tracking something like this for Binary Ninja specifically. Hitting that with a thumbs-up would be useful to let the developers know it's something the community wants and should be prioritized.
What are some alternatives?
ghidrecomp - Python Command-Line Ghidra Decompiler
dewolf - A research decompiler implemented as a Binary Ninja plugin.
angr - A powerful and user-friendly binary analysis platform!
ImHex - 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
ghidra - Ghidra is a software reverse engineering (SRE) framework
cdcEngineDXHR - Decompilation of Deus Ex: Human Revolution
mdec - Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.
x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
keystone - Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
ghidra-fr60 - Ghidra Plugin for Fujitsu FR60 Processors. Focused on DVRP's MB91302A in the Sony PSX.
ljd - LuaJIT Raw-Bytecode Decompiler (LJD)