Skip to content

mindsecurity/REload.Me

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

45 Commits

Repository files navigation

REload.Me

PythonLicensePlatformBuild

Static binary analysis framework with integrated Control Flow Graph visualization and AI-assisted reverse engineering guidance.

Overview

REload.Me provides comprehensive static analysis capabilities for PE and ELF binaries, featuring real-time CFG generation, security assessment, and intelligent analysis recommendations. Built for security researchers, malware analysts, and reverse engineers.

Features

Static Analysis Engine

  • Multi-format binary parsing (PE/ELF)
  • Security mitigation detection (ASLR, DEP, PIE, Canary)
  • Function discovery and analysis
  • Import/export enumeration
  • String extraction and analysis

Control Flow Analysis

  • Real-time CFG generation via angr
  • Function-level flow visualization
  • Basic block analysis with metrics
  • Connection mapping and statistics
  • ASCII terminal rendering

Intelligence Layer

  • AI-powered analysis recommendations
  • Dynamic analysis planning
  • Tool integration guidance
  • Educational context provision

Installation

git clone https://github.com/marcostolosa/REload.Me.git cd REload.Me pip install -e .

Usage

# Basic analysis reloadme analyze target.exe # Include CFG analysis reloadme analyze target.exe --cfg # Function-specific CFG reloadme analyze target.exe --cfg-function main

Command Reference

OptionDescription
analyze <file>Perform static analysis
--cfgInclude full binary CFG
--cfg-function <name>Analyze specific function CFG

Analysis Output

Binary Information

  • Architecture and platform details
  • Compilation metadata
  • Entry point identification

Security Assessment

┌─────────── Security Features ───────────┐ │ Canary │ Enabled │ │ NX (DEP) │ Enabled │ │ PIE │ Enabled │ │ ASLR │ Enabled │ └─────────────────────────────────────────┘ 

Function Analysis

  • Complete function enumeration
  • Entry point detection
  • Call convention analysis
  • Size and complexity metrics

CFG Visualization

+- 0x401000 (size: 7, instr: 1) +-> 0x401007 | +- 0x401007 (size: 17, instr: 4) +-> 0x401018 | +- 0x401018 (size: 4, instr: 1) +-> 0x40101d +-> 0x40101c 

Architecture

reloadme/ ├── analysis/ │ ├── static_analyzer.py # Core analysis engine │ └── cfg_analyzer.py # CFG generation ├── presentation/ │ ├── display.py # Output formatting │ └── cfg_display.py # CFG visualization ├── mentorship/ │ └── ai_mentor.py # Intelligence layer └── main.py # CLI interface 

Dependencies

Core Requirements

  • Python 3.9+
  • radare2/r2pipe
  • rich (terminal UI)
  • typer (CLI framework)

CFG Analysis

  • angr (binary analysis)
  • graphviz (visualization)

AI Features

  • OpenAI API (optional)

Configuration

Set OpenAI API key for intelligence features:

export OPENAI_API_KEY="your-key-here"

License

MIT License - see LICENSE file.

Technical Notes

  • CFG generation requires angr framework
  • Large binaries may require extended analysis time
  • Terminal output optimized for dark themes
  • Cross-platform compatibility verified

REload.Me - Professional binary analysis framework

About

REload.Me – The most easy reverse engineer classroom.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages