Xenios91/Glyph
An architecture independent binary analysis tool for fingerprinting functions through NLP
This tool helps security researchers identify known vulnerable or malicious code functions within different IoT device binaries, even if they're designed for different processor architectures. You input a binary executable file (like an ELF file), and it outputs a web-based table that 'fingerprints' and categorizes the functions found within, making it easier to analyze and understand the code. It's designed for reverse engineers and cybersecurity analysts working with embedded systems.
Use this if you need to quickly identify and compare code functions across various binary files from IoT devices, especially when dealing with different underlying hardware architectures.
Not ideal if you are analyzing source code or if your primary need is general-purpose debugging rather than function identification within binaries.
Stars
15
Forks
3
Language
Python
License
Apache-2.0
Category
Last pushed
Feb 20, 2026
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/Xenios91/Glyph"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
Cloud-CV/EvalAI
:cloud: :rocket: :bar_chart: :chart_with_upwards_trend: Evaluating state of the art in AI
fireindark707/Python-Schema-Matching
A python tool using XGboost and sentence-transformers to perform schema matching task on tables.
graphbookai/graphbook
Visual AI development framework for training and inference of ML models, scaling pipelines, and...
visual-layer/fastdup
fastdup is a powerful, free tool designed to rapidly generate valuable insights from image and...
github/CodeSearchNet
Datasets, tools, and benchmarks for representation learning of code.