01Automated binary decompilation to C pseudocode for stripped executables.
02Control flow graph (CFG) recovery and detailed function mapping.
038 GitHub stars
04Symbolic execution to find valid input paths and solve complex constraints.
05Pattern-based vulnerability detection for identifying dangerous function calls.
06Extraction of strings, symbols, and cross-references for rapid triage.