
Boomerang Decompiler
#Security Testing#Malware Analysis
A script to detect and remove Canary Tokens with simple signature-based detections.
This is a fork of Boomerang: An Open Source Machine Code Decompiler
This is a fork of Boomerang, which is a general-purpose, open-source (BSD licensed) machine code decompiler. Boomerang currently supports the following architectures: x86 (IA-32 only), PPC, and ST20. It also supports these file formats: ELF, PE, DOS MZ, DOS/4GW LE, and Mach-O. The high-level language output is C. While pre-compiled packages are available for release versions (master branch), it is currently recommended to build the development version (develop branch) of the decompiler from source.
Building:
Build status Test Coverage develop master
Building prerequisites:
- A 64-bit operating system (32-bit may or may not work, but it is not officially supported.)
- A C++17 compiler (GCC 7+, Clang 6+, MSVC 2017+ are known to work)
- CMake 3.13+
- Qt5 (Qt 5.12+ is confirmed to work; earlier versions should also be compatible)
- Capstone 4.0.1+
- GNU Bison 3.3+
- GNU Flex 2.6+
- CCache 3.2+ (optional, for faster recompilation)
- Doxygen 1.8+ (optional, for generating documentation)
- Python 3 (optional, for running regression tests)
Building on Linux:
On a Linux system, you can build and install Boomerang using the standard cmake-make-make-install procedure. On a Debian-compatible system (e.g., Ubuntu), the following commands will clone, build, and install Boomerang: sudo apt-get install git build-e