Cuttermaran is an open-source reverse engineering framework designed for analyzing binaries. It provides a graphical user interface and integrates tools like Ghidra and Radare2 for disassembly, decompilation, and debugging.
Cuttermaran is an open-source reverse engineering framework that aims to provide a comprehensive environment for analyzing and understanding binaries. It features a user-friendly graphical interface that integrates several popular reverse engineering tools and techniques.
At the core of Cuttermaran is Ghidra, the advanced software reverse engineering suite developed by the NSA. It handles disassembly and decompilation of binary files, allowing you to inspect compiled code in assembly and high-level languages. Cuttermaran builds on Ghidra's capabilities by adding plugins, themes, and integrations with other tools.
One of the key integrations in Cuttermaran is with Radare2, another popular open-source reverse engineering framework. This allows Cuttermaran to leverage Radare2's strengths like hexadecimal editing, debugging, and advanced scripting. Cuttermaran combines the best aspects of Ghidra and Radare2 into a single cohesive environment.
Some key features of Cuttermaran include interactive graphs to visualize code flows and call graphs, seamless switching between different decompilers, collaboration via a built-in web server, scripting in Python and more. Cuttermaran aims to be a reverse engineer's complete workspace for analyzing malware, binaries, firmware files and more.
Here are some alternatives to Cuttermaran:
Suggest an alternative ❐