BinCAT is a static Binary Code Analysis Toolkit, designed to help reverse engineers, directly from IDA or using Python for automation.
It features:
Also Read : LOLBAS – Living Off The Land Binaries And Scripts
Quick FAQ
Supported host platforms:
Supported CPU for analysis (for now):
Only IDA v7 or later is supported
v6.9 may work, but we won’t support it.
Binary distribution install (recommended)
The binary distribution includes everything needed:
Install steps:
install_plugin.py
The analyzer can be used locally or through a Web service.
On Linux:
On Windows:
BinCAT should work with IDA on Wine, once pip is installed:
~/.wine/drive_c/Python27/python.exe get-pip.py
Ctrl-Shift-B
shortcut, or using the Edit -> Plugins -> BinCAT
menuBinCAT Configuration
pane, click <-- Current
to define the start addressGlobal options can be configured through the Edit/BinCAT/Options
menu.
Default config and options are stored in $IDAUSR/idabincat/conf
.
save to idb
checkboxPlaywright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…