lt-asset/resym

For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhuo Zhang, Nan Jiang, Xiangzhe Xu, Lin Tan, and Xiangyu Zhang. 🏆 ACM SIGSAC Distinguished Paper Award Winner

34
/ 100
Emerging

This project helps security researchers and reverse engineers analyze software by recovering meaningful names and types for variables and data structures within compiled programs. It takes stripped binary files and their decompiled code as input and uses AI models to output readable variable names and data structure definitions, making the code much easier to understand. This is for professionals involved in malware analysis, vulnerability research, or auditing legacy software without source code.

131 stars. No commits in the last 6 months.

Use this if you need to understand the internal workings of compiled software where debugging information has been removed, and you want to recover human-readable variable and data structure names.

Not ideal if you already have access to the source code or unstripped binaries with full debugging symbols, as its primary value is in reversing stripped executables.

reverse-engineering malware-analysis vulnerability-research software-auditing binary-analysis
Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 10 / 25
Maturity 16 / 25
Community 8 / 25

How are scores calculated?

Stars

131

Forks

6

Language

Makefile

License

BSD-3-Clause

Last pushed

Apr 10, 2025

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/llm-tools/lt-asset/resym"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.