search
Join or Log In

Binary Analysis

Browse 16 cybersecurity tools tagged with "Binary Analysis"

Reverse Engineering Challenges

Reverse Engineering Challenges

language

Cyber Range Training

Reverse Engineering Challenges on SecurityListing: A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

4.8(3)
Delphos Labs Analyze

Delphos Labs Analyze

language

Static Application Security Testing

Delphos Labs Analyze on SecurityListing: AI-powered reverse engineering tool for analyzing compiled binaries

4.7(2)
DARPA Bin2Math

DARPA Bin2Math

language

Static Application Security Testing

DARPA Bin2Math on SecurityListing: Extracts mathematical algorithms from binary programs for CPS analysis.

4.5(3)
Kodem C.O.R.E.

Kodem C.O.R.E.

language

Container Security

Kodem C.O.R.E. on SecurityListing: Unified engine correlating static & runtime analysis for app security

4.5(1)
DerSecur DerScanner

DerSecur DerScanner

language

Static Application Security Testing

DerSecur DerScanner on SecurityListing: SAST tool that scans source code and binaries for security vulnerabilities

4.5(1)
IO Wargame

IO Wargame

language

Cyber Range Training

IO Wargame on SecurityListing: Frontpage of the IO wargame with various versions and connection details.

4.5(1)
eShard esDynamic

eShard esDynamic

language

Penetration Testing

eShard esDynamic on SecurityListing: Platform for chip security testing and binary security analysis

4.5(1)
Finite State Platform

Finite State Platform

language

Software Composition Analysis

Finite State Platform on SecurityListing: Platform for vulnerability detection in firmware, binaries, and SBOMs

4.5(1)
Offensive 360 O360

Offensive 360 O360

language

Static Application Security Testing

Offensive 360 O360 on SecurityListing: SAST tool using virtual compilers to analyze source code for vulnerabilities

4.5(1)
Binary Ninja

Binary Ninja

language

Digital Forensics and Incident Response

Binary Ninja on SecurityListing: Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.

4.3(2)
Viper

Viper

language

Digital Forensics and Incident Response

Viper on SecurityListing: A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.

3.9(2)
DerScanner Mobile Application Security Testing (MAST)

DerScanner Mobile Application

language

Vulnerability Assessment

DerScanner Mobile Application Security Testing (MAST) on SecurityListing: Mobile app security testing platform for Android and iOS apps

3.8(1)
DerScanner Full Cycle Application Security Testing

DerScanner Full Cycle

language

Dynamic Application Security Testing

DerScanner Full Cycle Application Security Testing on SecurityListing: Full-cycle app security platform with SAST, DAST, MAST, SCA & binary analysis

ReversingLabs Spectra Assure

ReversingLabs Spectra Assure

language

Application Security

Binary analysis platform detecting malware in software supply chains using AI-driven threat intelligence.

SCANOSS Encryption Dataset

SCANOSS Encryption Dataset

language

Risk Assessment

SCANOSS Encryption Dataset on SecurityListing: Identifies cryptographic algorithms and libraries in code for compliance

Offensive360 Offensive 360 Virtual Compiler

Offensive360 Offensive 360

language

Static Application Security Testing

Offensive360 Offensive 360 Virtual Compiler on SecurityListing: AI-driven SAST tool using virtual compilers for source code analysis