
Acunetix
Web vulnerability scanner for automated security testing of websites and web apps
Discover top open-source software, updated regularly with real-world adoption signals.

Static binary analyzer for automated vulnerability detection via abstract interpretation
BinAbsInspector is a static binary analyzer that leverages abstract interpretation on Ghidra Pcode to automatically detect multiple CWE vulnerabilities across x86, x64, ARMv7, and AArch64 binaries.
BinAbsInspector is a static analysis tool built on top of Ghidra that uses abstract interpretation of Ghidra's Pcode to scan binaries for security weaknesses. It supports the major architectures—x86, x64, ARMv7, and AArch64—and includes checkers for over a dozen CWE classes such as command injection, buffer overflows, use‑after‑free, and integer overflows.
The tool is aimed at security researchers, reverse‑engineers, and development teams that need automated binary‑level vulnerability assessment. It can be run in three modes: directly within Ghidra’s GUI, via Ghidra’s headless command‑line interface, or inside a Docker container for CI/CD integration. Installation requires Ghidra, a compatible Z3 SMT solver, and Java/Gradle for building the extension.
Implemented in Java, BinAbsInspector’s source is organized for easy extension. New checkers can be added in the com.bai.checkers package and the extension rebuilt with Gradle, allowing custom security rules to be incorporated alongside the existing CWE suite.
When teams consider BinAbsInspector, these hosted platforms usually appear on the same shortlist.
Looking for a hosted option? These are the services engineering teams benchmark against before choosing open source.
Automated security audit of legacy firmware
Identify buffer overflows, integer overflows, and use‑after‑free bugs across ARM binaries without source code.
CI integration for binary release validation
Run BinAbsInspector in Docker to fail builds when new CWE violations are detected.
Educational reverse‑engineering labs
Students can visualize CWE reports directly in Ghidra GUI, linking findings to code locations.
Research on abstract interpretation techniques
Extend or add new checkers using the Java API and evaluate precision against known vulnerable samples.
It currently supports x86, x64, ARMv7, and AArch64 binaries.
No, BinAbsInspector runs as a Ghidra extension and uses the free Ghidra distribution.
Z3 serves as the SMT solver for constraint solving during abstract interpretation; you must install a compatible Z3 version (e.g., 4.8.15).
Yes, BinAbsInspector offers headless mode via Ghidra’s analyzeHeadless script and a Docker image for fully automated execution.
The project is built with Gradle and Java; you can implement new checkers in the `com.bai.checkers` package and rebuild the extension.
Project at a glance
DormantLast synced 4 days ago