ENNAENNA

cwe_checker

LGPL-3.0

🧬 Reverse Engineering · Rust

cwe_checker is a binary analysis tool written in Rust that detects common bug classes (CWEs) in compiled executables without requiring source code access, using the Ghidra disassembler as its analysis backend. It identifies vulnerability patterns including buffer overflows, use-after-free, null pointer dereferences, integer overflows, and other memory safety issues by analyzing the program's control flow and data flow at the binary level. Firmware security analysts, vulnerability researchers, and reverse engineers use cwe_checker to perform automated security assessments of compiled software, particularly embedded firmware and closed-source binaries where source code is unavailable. The tool maps its findings to CWE identifiers, provides detailed location information within the binary, and can process ELF and PE binaries across multiple architectures, making it a valuable first-pass triage tool for binary vulnerability assessment.

1.3kstars
142forks
27issues
Updated 1y ago

Tags

binarycwevulnerabilityghidrabinary-analysiscwe-checkerprogram-analysisreverse-engineeringsecuritysecurity-scannerstatic-analyzervulnerability-scanner

Community Reviews

No reviews yet. Be the first to review cwe_checker.

More in Reverse Engineering