Skip to main content

No project description provided

Project description

reait

RevEng.AI Toolkit

Analyse compiled executable binaries using the RevEng.AI API. This tool allows you to search for similar components across different compiled executable programs. More details about the API can be found at docs.reveng.ai.

NB: We are in Alpha. We support GNU/Linux ELF and Windows PE executables for x86_64, and focus our support for x86_64 Linux ELF executables.

Installation

Install the latest stable version using pip.

pip install reait

Latest development version

pip install -e .

Using reait

Analysing binaries

To submit a binary for analysis, run reait with the -a flag:

reait -b /usr/bin/true -a

This uploads the binary specified by -b to RevEng.AI servers for analysis. Depending on the size of the binary, it may take several hours. You may check an analysis jobs progress with the -l flag e.g. reait -b /usr/bin/true -l.

Extract symbol embeddings

Symbol embeddings are numerical vector representations of each component that capture their semantic understanding. Similar functions should be similar to each other in our embedded vector space. They can be thought of as advanced AI-based IDA FLIRT signatures or Radare2 Zignatures. Once an analysis is complete, you may access RevEng.AI's BinNet embeddings for all symbols extracted with the -x flag.

reait -b /usr/bin/true -x > embeddings.json

Extract embedding for symbol at vaddr 0x19f0

reait -b /usr/bin/true -x | jq ".[] | select(.vaddr==$((0x19f0))).embedding" > embedding.json

Search for similar symbols based on JSON embedding file

To query our database of similar symbols based on an embedding, use -n to search using Approximate Nearest Neighbours. The --nns allows you to specify the number of results returned. A list of symbol names and the distance between each vector is returned.

reait -e embedding.json -n

NB: A smaller distance indicates a higher degree of similarity.

Limited Search

To search for the most similar symbols found in a binary to a specific embedding, use the --found-in option with a path to the executable.

reait -n --embedding /tmp/sha256_init.json --found-in ~/malware.exe

This downloads embeddings from malware.exe and computes the cosine similarity between all symbols and sha256_init.json. The returned results lists the most similar results by cosine similarity score (1.0 most similar, -1.0, dissimilar).

Configuration

reait reads the config file stored at ~/.reait.toml. An example config file looks like:

apikey = "l1br3"
host = "https://api.reveng.ai"

Contact

Connect with us by filling out the contact form at RevEng.AI.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

reait-0.0.9.tar.gz (17.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

reait-0.0.9-py3-none-any.whl (17.4 kB view details)

Uploaded Python 3

File details

Details for the file reait-0.0.9.tar.gz.

File metadata

  • Download URL: reait-0.0.9.tar.gz
  • Upload date:
  • Size: 17.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.9.13

File hashes

Hashes for reait-0.0.9.tar.gz
Algorithm Hash digest
SHA256 b60755331c8d5071ef564f3f22ca8394893a41177874bcca6bbfbc5b224474d9
MD5 9e1cc0ab3db1333a4ea708bf7076a3d7
BLAKE2b-256 0a36ab1b06079efd25b6853fd18daa75f12e1f5bf061d8643bf2618754056dfc

See more details on using hashes here.

File details

Details for the file reait-0.0.9-py3-none-any.whl.

File metadata

  • Download URL: reait-0.0.9-py3-none-any.whl
  • Upload date:
  • Size: 17.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.9.13

File hashes

Hashes for reait-0.0.9-py3-none-any.whl
Algorithm Hash digest
SHA256 1cbcc9f4722099322b00be7d54edf03415b0bccb756ab84d0d8cbf7b43717b84
MD5 147f115ed284f6342a0158e9fdde7be6
BLAKE2b-256 00bf4d0ee8f0549291a25040743fcdfe21924156ccfc57e67176effbe94b97fa

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page