- Implementing Pyghidra to reduce setup requirements
- Changing underlying server to fastapi
- New UI theme
- More configuration
- Bug fixes and better dockerization.
- Better test
- Pydantic implementation
- Anti-XSS
- Anti-CSRF
- User accounts
Glyph Wiki: https://github.com/Xenios91/Glyph/wiki
Glyph API Documentation: http://localhost:8080/docs
- Python version 3.11+
Reverse engineering is an important task performed by security researchers to identify vulnerable functions and malicious functions in IoT (Internet of Things) devices that are often shared across multiple devices of many system architectures. Common techniques to currently identify the reuse of these functions do not perform cross-architecture identification unless specific data such as unique strings are identified that may be of use in identifying a piece of code. Utilizing natural language processing techniques, Glyph allows you to upload an ELF binary (32 & 64 bit) for cross-architecture function fingerprinting, upon analysis, a web-based function symbol table will be created and presented to the user to aid in their analysis of binary executables/shared objects.
