Skip to content

Xenios91/Glyph

Repository files navigation

Glyph

An architecture independent binary analysis tool for fingerprinting functions through NLP

Upcoming Release V0.1.0

  • Implementing Pyghidra to reduce setup requirements
  • Changing underlying server to fastapi
  • New UI theme
  • More configuration
  • Bug fixes and better dockerization.
  • Better test
  • Pydantic implementation
  • Anti-XSS
  • Anti-CSRF
  • User accounts

Black Hat Arsenal 2022

Black Hat Arsenal 2023 & Defcon Demo Labs

CodeQL Pylint

Glyph Wiki: https://github.com/Xenios91/Glyph/wiki

Glyph API Documentation: http://localhost:8080/docs

Requirements

  • Python version 3.11+

About

Reverse engineering is an important task performed by security researchers to identify vulnerable functions and malicious functions in IoT (Internet of Things) devices that are often shared across multiple devices of many system architectures. Common techniques to currently identify the reuse of these functions do not perform cross-architecture identification unless specific data such as unique strings are identified that may be of use in identifying a piece of code. Utilizing natural language processing techniques, Glyph allows you to upload an ELF binary (32 & 64 bit) for cross-architecture function fingerprinting, upon analysis, a web-based function symbol table will be created and presented to the user to aid in their analysis of binary executables/shared objects.

Main Page

About

An architecture independent binary analysis tool for fingerprinting functions through NLP

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors