Xenios91/Glyph

An architecture independent binary analysis tool for fingerprinting functions through NLP

46
/ 100
Emerging

This tool helps security researchers identify known vulnerable or malicious code functions within different IoT device binaries, even if they're designed for different processor architectures. You input a binary executable file (like an ELF file), and it outputs a web-based table that 'fingerprints' and categorizes the functions found within, making it easier to analyze and understand the code. It's designed for reverse engineers and cybersecurity analysts working with embedded systems.

Use this if you need to quickly identify and compare code functions across various binary files from IoT devices, especially when dealing with different underlying hardware architectures.

Not ideal if you are analyzing source code or if your primary need is general-purpose debugging rather than function identification within binaries.

reverse-engineering binary-analysis cybersecurity IoT-security vulnerability-research
No Package No Dependents
Maintenance 10 / 25
Adoption 6 / 25
Maturity 16 / 25
Community 14 / 25

How are scores calculated?

Stars

15

Forks

3

Language

Python

License

Apache-2.0

Last pushed

Feb 20, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/Xenios91/Glyph"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.