dewolf
binaryninja-api
Our great sponsors
dewolf | binaryninja-api | |
---|---|---|
1 | 9 | |
157 | 815 | |
5.7% | 4.3% | |
8.3 | 9.7 | |
1 day ago | 4 days ago | |
Python | C++ | |
GNU Lesser General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
dewolf
binaryninja-api
- The Hiew Hex Editor
-
[Media] I'm currently learning Rust. Out of curiosity, I opened the resulting binary as a text file, and among the garbled text characters, I saw this weird text. Is this normal or is there something wrong with the compiled binary? It's the "Hello, World!" sample program and it executes normally.
If you really want to poke around in the binary, you can use a decompiler like IDA, Ghidra, or Binary Ninja's free version.
-
Ida Free
Still $$$ for crippled functionality.
As an alternative, https://binary.ninja is gaining traction at work.
- Binary Ninja
- Public API, examples, documentation and issues for Binary Ninja
-
Looking for this software (If off-topic, I'll delete)
Possibly binary ninja
-
Teaching A Machine To Identify Vulnerabilities (Part 1)
As I said, a regular text editor won’t do for reading a binary file, so I needed to choose a disassembler to break the challenge binaries out into their basic blocks. I chose to use Binary Ninja because it has a very easy-to-use Python API, and it’s hobbyist-level cheap (for comparison, the industry-standard disassembler is IDA Pro, which they will sell to you for roughly an arm, and continue to pick off your fingers and toes with renewal fees). I began by writing a quick script to go through a single binary and print out the opcodes it encountered in each block, just to validate that I was able to acquire the data I wanted.
-
Why do most hackers base their personality around hacking?
It’s an awesome reverse engineering tool (https://binary.ninja). Has really nice api support so you can basically automate anything and make plugins for custom architectures and stuff like that.
-
Introducing Decompiler Explorer (🐶⚡️)
If you agree, there is a GitHub issue tracking something like this for Binary Ninja specifically. Hitting that with a thumbs-up would be useful to let the developers know it's something the community wants and should be prioritized.
What are some alternatives?
decomp.me - Collaborative decompilation and reverse engineering website
decompiler-explorer - Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!
mdec - Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.
ImHex - 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
binaryninja-openai - Integrates OpenAI with BinaryNinja via a plugin.
cdcEngineDXHR - Decompilation of Deus Ex: Human Revolution
windbg-code-tracing - Pykd script to perform simple code tracing and so inspecting control flow executed (CFE).
x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
ret-sync - ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja disassemblers.
keystone - Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings