search
Join or Log In

Binary Security

Browse 20 cybersecurity tools tagged with "Binary Security"

Reverse Engineering Challenges

Reverse Engineering Challenges

language

Cyber Range Training

Reverse Engineering Challenges on SecurityListing: A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

4.8(3)
PEview

PEview

language

Digital Forensics and Incident Response

PEview on SecurityListing: A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

4.7(2)
exif

exif

language

Digital Forensics and Incident Response

exif on SecurityListing: A command-line utility to show and change EXIF information in JPEG files

4.7(2)
DEF CON CTF Archive

DEF CON CTF

language

Container Security

DEF CON CTF Archive on SecurityListing: A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.

4.5(1)
GNU Binutils

GNU Binutils

language

Digital Forensics and Incident Response

GNU Binutils on SecurityListing: A collection of binary tools for various purposes including linking, assembling, profiling, and more.

4.5(1)
Explorer Suite

Explorer Suite

language

Digital Forensics and Incident Response

Explorer Suite on SecurityListing: A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

4.5(1)
Threat.Zone

Threat.Zone

language

Digital Forensics and Incident Response

Threat.Zone on SecurityListing: Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.

4.5(1)
Contagio Mobile

Contagio Mobile

language

Digital Forensics and Incident Response

Contagio Mobile on SecurityListing: A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.

4.5(1)
class-dump

class-dump

language

Mobile App Security

class-dump on SecurityListing: A command-line utility for examining Objective-C runtime information in Mach-O files and generating class declarations.

4.5(1)
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence

bohops Leveraging INF-SCT

language

Offensive Security

bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

4.3(2)
Binary Ninja

Binary Ninja

language

Digital Forensics and Incident Response

Binary Ninja on SecurityListing: Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.

4.3(2)
Java Decompiler Online

Java Decompiler Online

language

Offensive Security

Java Decompiler Online on SecurityListing: Online Java decompiler tool with support for modern Java features.

4.3(2)
SmaliHook

SmaliHook

language

Mobile App Security

SmaliHook on SecurityListing: Original SmaliHook Java source for Android cracking and reversing.

4.2(3)
edb

edb

language

Digital Forensics and Incident Response

edb on SecurityListing: edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.

3.8(1)
WinHex

WinHex

language

Digital Forensics and Incident Response

WinHex on SecurityListing: Universal hexadecimal editor for computer forensics, data recovery, and IT security.

Variegate

Variegate

language

Static Application Security Testing

Variegate on SecurityListing: Source code diversification tool that creates program variants with diversity

xxd

xxd

language

Digital Forensics and Incident Response

xxd on SecurityListing: A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.

UPX

UPX

language

Offensive Security

UPX on SecurityListing: UPX is a high-performance executable packer for various executable formats.

Tracking a stolen code-signing certificate with osquery

Tracking a stolen

language

Digital Forensics and Incident Response

Tracking a stolen code-signing certificate with osquery on SecurityListing: Detect signed malware and track stolen code-signing certificates using osquery.

Windows Oneliners for Remote Code Execution

Windows Oneliners for

language

Offensive Security

Windows Oneliners for Remote Code Execution on SecurityListing: Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.