Bokken allows users to disassemble, debug, and analyze malware without needing extensive knowledge of command line tools, aiming to be an intuitive and easy-to-use reverse engineering tool.
Bokken is a graphical user interface intended to be used with pyew and radare2 reverse engineering frameworks. It allows users to disassemble, debug, and analyze malware binaries without needing to have extensive knowledge of command line tools or reverse engineering concepts.
Some key features of Bokken include:
The goal of the Bokken project is to lower the access threshold for analyzing and understanding malware through reverse engineering. It aims to put enterprise-level reverse engineering capabilities within reach of security professionals, malware analysts, forensic investigators, and hobbyists. Being open source allows the Bokken community to continually add features and analysis modules over time.
Here are some alternatives to Bokken:
Suggest an alternative ❐