Reverse Dependencies of lief
The following projects have a declared dependency on lief:
- AFS-file-validator — 测试AFS文件签名
- appimage-builder — Recipe based AppImage creation meta-tool
- bintropy — Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes
- blint — Linter and SBOM generator for binary files.
- cemu — Cemu is a simple assembly/dissembly/emulation IDE that provides an easy Plug-n-Play environment to start playing with many architectures (currently supports x86-{32,64}, ARM, AARCH64, MIPS, MIPS64, SPARC and PPC).
- checksec.py — Checksec tool implemented in Python
- chomper — A lightweight emulation framework for emulating iOS executables and libraries.
- crc-tool — no summary
- cx_Freeze — Create standalone executables from Python scripts
- cysecuretools — Python tools for provisioning Cypress/Infineon MCUs
- datolite — Complete Binary Patcher
- dycall — Run exported symbols from native libraries
- edgeprotecttools — Python tools for provisioning Cypress/Infineon MCUs
- ExecParser — Parse PE, ELF, and Mach-O using lief
- exespy — Cross-platform PE viewer
- FAMEwork — Framework for Adversarial Malware Evaluation
- frida-definitions-generator — Generate TypeScript definition files for use with Frida
- fuel-track — Lleva seguimiento del consumo de combustible
- fuzz-craft — Toolkit for creating fuzzing harnesses.
- fuzzable — Framework for Automating Fuzzable Target Discovery with Static Analysis
- ipa-tool — Simple tool for getting infos from Apple ipa archive
- kavanoz — Unpacking framework for common android malware
- linktools — linktools toolkit
- madgadget — madgadget
- MakkaPakka — A programming language for injecting code into ELF files.
- mrextractor — A library for binaries feature extraction
- nosplash — A simple script utility that allows you to extract and set custom splash inside EWSF.EWS
- pastis-framework — PASTIS framework for collaborative fuzzing
- patcherex2 — no summary
- pymisp — Python API for MISP.
- pymisp-async — Python async API for MISP.
- pyqbdl — no summary
- pyrrha-mapper — A mapper collection for firmware analysis
- pysigtool — Extract digital signatures contained in a PE file.
- pysquishy — LLVM pass wrapper library for creating robust shellcode
- reait — no summary
- reminder-detector — Implementation of the packing detection heuristic from the paper "Packed PE File Detection for Malware Forensics" of Han et al.
- river-core — RiVer Core Verification Framework
- rpcclient — rpcclient for connecting with the rpcserver
- secml-malware — no summary
- shooker — Tool for C-code injections in already compiled bins
- sqlelf — Explore ELF objects through the power of SQL
- surfactant — Modular framework to gather file information, analyze dependencies, and generate an SBOM
- themida-unmutate — Static deobfuscator for Themida's mutation-based obfuscation.
- thundera-bsa — Command Line Interface for ThunderaBSA
- tinyrv — A tiny RISC-V instruction set simulator
- toyotama — Python library for CTF.
- tritondse — A library of Dynamic Symbolic Exploration based the Triton library
- umbrella-py — ObjC and Swift application binary interface (ABI) to inspect static runtime information. (w. Class-Dump)
- unblob — Extract files from any kind of container formats
- xl2roefact — Excel invoices data retrieve, export & upload to RO E-Fact system
- xmonkey-curator — Automated OSS curation scanner
1