Вы находитесь на странице: 1из 4

Binary tools

https://blackarch.org/binary.html

Binary tools https://blackarch.org/binary.html BlackArch Linux Penetration Testing Distribution B i n a r y The list

BlackArch Linux Penetration Testing Distribution

Binary

Linux Penetration Testing Distribution B i n a r y The list Home (index.html) / tools

The list

Home (index.html) / tools (tools.html) / Binary

Packages that operate on binary les in some form.

Tool count: 41 ()

BlackArch binary Name Version Homepage https://github.com/androguard/androguard androguard 905.9823efd Description
BlackArch binary
Name
Version
Homepage
https://github.com/androguard/androguard
androguard 905.9823efd
Description
Reverse engineering,
Malware and goodware
analysis of Android
applications and more.
(https://github.com/androguard/androguard)

Binary tools

https://blackarch.org/binary.html

Name

Version

3880.d9017de5

Description The next-generation binary analysis platform from UC Santa Barbara's Seclab.

Homepage

https://github.com/angr/angr

angr

(https://github.com/angr/angr)

 

A

multiplatform open

source Binary Analysis and

https://github.com/programa-stic/barf-project

barf

601.056bd45

Reverse engineering Framework.

(https://github.com/programa-stic/barf-project)

 

https://github.com/Vector35/binaryninja-python

binaryninja-

python

13.83f59f7

Binary Ninja prototype written in Python.

(https://github.com/Vector35/binaryninja-

python)

 

4504.67019b97b A static analysis tool for

binaries

https://bitbucket.org/mihaila/bindead

bindead

(https://bitbucket.org/mihaila/bindead)

 

A

comparison tool for

4.2.0

binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.

http://www.zynamics.com/bindiff.html

bindiff

(http://www.zynamics.com/bindiff.html)

 

4.c4140d7

POSIX function tracing. Much better and faster than ftrace.

https://github.com/elfmaster/binflow

binflow

(https://github.com/elfmaster/binflow)

 

4.0aabd8b

Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).

https://github.com/bmaia/binwally

binwally

(https://github.com/bmaia/binwally)

 

A

display-oriented editor for

bvi

1.4.0

binary files operate like "vi"

editor.

http://bvi.sourceforge.net/

(http://bvi.sourceforge.net/)

bytecode-

222.42caddf

A Java 8/Android APK Reverse Engineering Suite.

https://github.com/Konloch/bytecode-viewer

viewer

(https://github.com/Konloch/bytecode-viewer)

 

23.1cf52f9

A tool for enumerating the code caves in PE files.

https://github.com/EgeBalci/Cminer/

cminer

(https://github.com/EgeBalci/Cminer/)

detect-

A

program for determining

https://github.com/horsicq/Detect-It-Easy

it-easy

50.6ae37ad

types of files.

(https://github.com/horsicq/Detect-It-Easy)

 

1

This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.

http://packetstormsecurity.com/files/125972

/Coloured-ELF-File-Dissector.html

dissector

(http://packetstormsecurity.com/files/125972

/Coloured-ELF-File-Dissector.html)

 

10.37fa3ab

Analysis PE file or Shellcode.

https://github.com/dungtv543/Dutas

dutas

(https://github.com/dungtv543/Dutas)

 

294.aad6193

Extended core file snapshot format.

https://github.com/elfmaster/ecfs

ecfs

(https://github.com/elfmaster/ecfs)

 

http://www.muppetlabs.com/~breadbox

 

3.1

Collection of ELF utilities (includes sstrip)

/software/elfkickers.html

elfkickers

(http://www.muppetlabs.com/~breadbox

 

/software/elfkickers.html)

 

7.39d21ca

Cross Platform ELF analysis.

https://github.com/jacob-baines/elfparser

elfparser

(https://github.com/jacob-baines/elfparser)

eresi

1267.d0facbfd

https://github.com/thorkill/eresi

The ERESI Reverse Engineering Software Interface.

(https://github.com/thorkill/eresi)

Binary tools

https://blackarch.org/binary.html

Name

Version

Description

Homepage

 

A

tool to detect anomalies

exescan

1.ad993e3

in

PE (Portable Executable)

files.

https://github.com/cysinfo/Exescan

(https://github.com/cysinfo/Exescan)

 

Looks for all export and import names that contain

 

expimp-

lookup

4.79a96c7

a

Portable Executable in a

specified string in all

https://github.com/tr3w/ExpImp-Lookup

(https://github.com/tr3w/ExpImp-Lookup)

 

directory tree.

 

A

Python framework for

finding C structures from process memory - heap analysis - Memory structures forensics.

https://github.com/trolldbois/python-haystack

haystack

1759.df8b7ca

(https://github.com/trolldbois/python-haystack)

 

A

special payload

hercules-

payload

219.31f23e2

generator that can bypass

all antivirus software.

https://github.com/EgeBalci/HERCULES

(https://github.com/EgeBalci/HERCULES)

 

Converts Motorola and Intel hex files to binary.

http://hex2bin.sourceforge.net/

hex2bin

2.5

(http://hex2bin.sourceforge.net/)

 

Small tool to package javascript into a valid image file.

https://github.com/jklmnn/imagejs

imagejs

51.dc70622

(https://github.com/jklmnn/imagejs)

 

Porting Windows Dynamic Link Libraries to Linux.

https://github.com/taviso/loadlibrary

loadlibrary

15.ca6dce8

(https://github.com/taviso/loadlibrary)

oledump

0.0.27

Analyze OLE files (Compound File Binary Format). These files contain streams of data. This tool allows you to analyze these streams.

http://blog.didierstevens.com/programs /oledump-py/ (http://blog.didierstevens.com /programs/oledump-py/)

 

Tools to analyze Microsoft OLE2 files.

http://www.decalage.info/python/oletools

oletools

0.50

(http://www.decalage.info/python/oletools)

 

Script which uses a PEiD database to identify which packer (if any) is being used by a binary.

http://handlers.sans.org/jclausing/

packerid

1.4

(http://handlers.sans.org/jclausing/)

 

Powerful binary patching from Python.

https://github.com/lunixbochs/patchkit

patchkit

32.9f6b064

(https://github.com/lunixbochs/patchkit)

pixd

5.85c1cb6

https://github.com/FireyFly/pixd

Colourful visualization tool for binary files.

(https://github.com/FireyFly/pixd)

powerstager 11.abcfbaf

A payload stager using PowerShell.

https://github.com/z0noxz/powerstager

(https://github.com/z0noxz/powerstager)

Provides a command line interface and a C library to manipulate the address space of a running program on Linux.

https://github.com/daniel-araujo/proctal

proctal

248.dfd6697

(https://github.com/daniel-araujo/proctal)

saruman

1.1a8e77d

https://github.com/elfmaster/saruman

ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection).

(https://github.com/elfmaster/saruman)

Binary tools

https://blackarch.org/binary.html

Name Version Description Homepage A Java Bytecode Analysis http://www.sable.mcgill.ca/soot soot 2.5.0 and
Name
Version
Description
Homepage
A
Java Bytecode Analysis
http://www.sable.mcgill.ca/soot
soot
2.5.0
and Transformation
(http://www.sable.mcgill.ca/soot)
Framework.
A
collection of SWF
http://www.swftools.org/
swftools
0.9.2
manipulation and creation
(http://www.swftools.org/)
utilities
A Dynamic Binary Analysis
(DBA) framework.
https://github.com/JonathanSalwan/Triton
triton
1904.5d876f6f
(https://github.com/JonathanSalwan/Triton)
http://upx.sourceforge.net/
upx
3.94
Ultimate executable
compressor.
(http://upx.sourceforge.net/)
A
tool to help find memory-
valgrind
3.12.0
management problems in
http://valgrind.org/ (http://valgrind.org/)
programs
veles
2017.5.0
New open source tool for
binary data analysis.
https://codisec.com/veles/ (https://codisec.com
/veles/)
https://github.com/endrazine/wcc
wcc
27.1a7a00c
The Witchcraft Compiler
Collection.
(https://github.com/endrazine/wcc)
A free hex editor / disk
http://wxhexeditor.sourceforge.net/
wxhexeditor 597.bb951eb
editor for Linux, Windows
and MacOSX.
(http://wxhexeditor.sourceforge.net/)
(https://github.com/BlackArch)
(https://twitter.com/blackarchlinux)
(irc://irc.freenode.net
/blackarch)
(https://blackarch.org/blog.html)
(https://blackarch.org/rss.xml)

BlackArch Linux 2013-2017