RevEngAI/reait

RevEng.AI Toolkit and Python API

40
/ 100
Emerging

This toolkit helps cybersecurity analysts and reverse engineers understand compiled executable programs. It takes a binary file (like an ELF or PE executable) as input, analyzes its components, and identifies similarities to other known binaries. The output includes information like symbol embeddings, vulnerability data, and matches to open-source components, aiding in tasks like malware analysis or software composition analysis.

No commits in the last 6 months.

Use this if you need to identify known components, vulnerabilities, or find similar functions within unknown or stripped executable binaries.

Not ideal if you are working with source code or high-level applications, as this tool specifically focuses on low-level compiled binary analysis.

reverse-engineering malware-analysis vulnerability-discovery software-composition-analysis digital-forensics
Stale 6m No Package No Dependents
Maintenance 2 / 25
Adoption 7 / 25
Maturity 16 / 25
Community 15 / 25

How are scores calculated?

Stars

33

Forks

6

Language

Python

License

GPL-3.0

Category

ai-red-teaming

Last pushed

Sep 23, 2025

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/RevEngAI/reait"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.