Binary Security
Browse 20 cybersecurity tools tagged with "Binary Security"

Reverse Engineering Challenges
Cyber Range Training
Reverse Engineering Challenges on SecurityListing: A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

PEview
Digital Forensics and Incident Response
PEview on SecurityListing: A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

exif
Digital Forensics and Incident Response
exif on SecurityListing: A command-line utility to show and change EXIF information in JPEG files

DEF CON CTF
Container Security
DEF CON CTF Archive on SecurityListing: A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.

GNU Binutils
Digital Forensics and Incident Response
GNU Binutils on SecurityListing: A collection of binary tools for various purposes including linking, assembling, profiling, and more.

Explorer Suite
Digital Forensics and Incident Response
Explorer Suite on SecurityListing: A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

Threat.Zone
Digital Forensics and Incident Response
Threat.Zone on SecurityListing: Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.

Contagio Mobile
Digital Forensics and Incident Response
Contagio Mobile on SecurityListing: A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.

class-dump
Mobile App Security
class-dump on SecurityListing: A command-line utility for examining Objective-C runtime information in Mach-O files and generating class declarations.

bohops Leveraging INF-SCT
Offensive Security
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

Binary Ninja
Digital Forensics and Incident Response
Binary Ninja on SecurityListing: Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.

Java Decompiler Online
Offensive Security
Java Decompiler Online on SecurityListing: Online Java decompiler tool with support for modern Java features.

SmaliHook
Mobile App Security
SmaliHook on SecurityListing: Original SmaliHook Java source for Android cracking and reversing.

edb
Digital Forensics and Incident Response
edb on SecurityListing: edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.

WinHex
Digital Forensics and Incident Response
WinHex on SecurityListing: Universal hexadecimal editor for computer forensics, data recovery, and IT security.

Variegate
Static Application Security Testing
Variegate on SecurityListing: Source code diversification tool that creates program variants with diversity

xxd
Digital Forensics and Incident Response
xxd on SecurityListing: A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.

UPX
Offensive Security
UPX on SecurityListing: UPX is a high-performance executable packer for various executable formats.
Tracking a stolen
Digital Forensics and Incident Response
Tracking a stolen code-signing certificate with osquery on SecurityListing: Detect signed malware and track stolen code-signing certificates using osquery.

Windows Oneliners for
Offensive Security
Windows Oneliners for Remote Code Execution on SecurityListing: Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.