Analysis tools logo

18 Binaries Static Analysis Tools

Type:
Any
7

cargo-bloat

  • Type: cli
1674

Find out what takes most of the space in your executable. supports ELF (Linux, BSD), Mach-O (macOS) and PE (Windows) binaries.

1

angr

  • Type: cli

Binary code analysis tool that also supports symbolic execution.

1

Ghidra

  • Type: cli
36155

A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission

1

rust-audit

  • Type: cli
307

Audit Rust binaries for known bugs or security vulnerabilities. This works by embedding data about the dependency tree (Cargo.lock) in JSON format into a dedicated linker section of the compiled executable.

1

Twiggy

  • Type: cli
949

Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.

0

binbloom

  • Type: cli
366

Analyzes a raw binary firmware and determines features like endianness or the loading address. The tool is compatible with all architectures. Loading address: binbloom can parse a raw binary firmware and determine its loading address. Endianness: binbloom can use heuristics to determine the endianness of a firmware. UDS Database: binbloom can parse a raw binary firmware and check if it contains an array containing UDS command IDs.

0

BinSkim

  • Type: cli
635

A binary static analysis tool that provides security and correctness results for Windows portable executables.

0

Black Duck

  • Type: cli

Tool to analyze source code and binaries for reusable code, necessary licenses and potential security aspects.

0

bloaty

  • Type: cli
3977

Ever wondered what's making your binary big? Bloaty McBloatface will show you a size profile of the binary so you can understand what's taking up space inside. Bloaty performs a deep analysis of the binary. Using custom ELF, DWARF, and Mach-O parsers, Bloaty aims to accurately attribute every byte of the binary to the symbol or compileunit that produced it. It will even disassemble the binary looking for references to anonymous data. F

0

VMware chap

  • Type: cli
306

chap analyzes un-instrumented ELF core files for leaks, memory growth, and corruption. It is sufficiently reliable that it can be used in automation to catch leaks before they are committed. As an interactive tool, it helps explain memory growth, can identify some forms of corruption, and supplements a debugger by giving the status of various memory locations.

0

cwe_checker

  • Type: cli
757

cwe_checker finds vulnerable patterns in binary executables.

0

IDA Free

  • Type: cli

Binary code analysis tool.

0

Jakstab

  • Type: cli
131

Jakstab is an Abstract Interpretation-based, integrated disassembly and static analysis framework for designing analyses on executables and recovering reliable control flow graphs.

0

JEB Decompiler

  • Type: cli

Decompile and debug binary code. Break down and analyze document files. Android Dalvik, MIPS, ARM, Intel x86, Java, WebAssembly & Ethereum Decompilers.

0

Manalyze

  • Type: cli
882

A static analyzer, which checks portable executables for malicious content.

0

mcsema

  • Type: cli
2415

Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode. It translates ("lifts") executable binaries from native machine code to LLVM bitcode, which is very useful for performing program analysis methods.

0

zydis

  • Type: cli
2585

Fast and lightweight x86/x86-64 disassembler library

-1

Nauz File Detector

  • Type: cli
422

Static Linker/Compiler/Tool detector for Windows, Linux and MacOS.

❤️ Sponsor this project

We are currently looking for partners who want to sponsor hosting and development of the project.

Check out our Github Sponsors page here

Missing an entry? Please let us know.