01String-to-function correlation for identifying key logic
02Deep decompilation using r2ghidra and Ghidra headless
03Control flow graph (CFG) and call graph generation
04Function enumeration and cross-reference (xrefs) mapping
05Automated identification of network and cryptographic patterns
068 GitHub stars