Tool for reverse engineering stripped binary files with no function names. Using a word-2-vec model this tool identifies functions that (where it's been trained against) are close to the composition of the stripped binary's function(s) - allowing reverse engineers to gain an understanding on the type of activity present in the function.
Locked post. New comments cannot be posted.