REsearch Tools
Instantly scan your firmware and software for critical vulnerabilities with our suite of free detection tools. Get actionable insights without commitment or configuration
Binarly is trusted by
All Tools
|
VulHunt goes beyond version matching and YARA signatures. Write Lua rules that leverage dataflow analysis, code pattern matching, and decompilation to detect known and unknown vulnerabilities in POSIX binaries and UEFI firmware.
Binary Risk Hunt is a free service that helps security teams and product owners confirm what their firmware and software is truly composed of. A free scan produces a custom report and SBOM file, verifying composition and exposing risks lurking below the source code.
Idiomatic Rust bindings for the IDA SDK, enabling advanced analysis tool development.
Upload a binary and see if you're impacted by PKfail.
PKFail
Upload a binary and see if you're impacted by XZ Utils.
XZ Backdoor
A rule format designed to scan for vulnerabilities in UEFI firmware.
Tools for analyzing UEFI firmware and checking modules with FwHunt rules.
IDA plugin for UEFI firmware analysis and reverse engineering automation.
Ship and buy software you can prove is safe.
Schedule a live demo to see how Binarly validates SBOM/CBOM, surfaces risks, and charts a measurable path to post-quantum readiness