The ultimate AI-powered automated reverse engineering & security analysis platform.
Drop a binary. Get an instant, deep-dive vulnerability report.
ReversAI eliminates the tedious manual labor of binary analysis. Whether you're dealing with a stripped ELF, a packed Windows PE, or a suspicious Python script, just drag and drop it into the sleek web interface.
The system automatically rips it apart—extracting imports, strings, analyzing security mitigations, and leveraging radare2 to disassemble and decompile the most interesting functions. Finally, it feeds this rich context into advanced AI models (GPT-4 or Claude) to hunt for zero-days, logic flaws, and hardening gaps.
- 🪄 Zero-Click Decompilation: Automatically uses
radare2withr2decorr2ghidrato pull pseudo-C code from machine instructions. - 🧠 LLM Vulnerability Hunting: Feeds decompiled functions and file metadata directly into advanced AI models to identify complex vulnerabilities like Use-After-Free, buffer overflows, and command injections.
- 🛡️ Mitigation Analysis: instantly checks binaries for ASLR, DEP/NX, PIE, RELRO, Stack Canaries, and CFG compliance.
- 🧬 Universal Support:
Windows PE(.exe, .dll, .sys)Linux ELF(.so, binaries)macOS Mach-O(.dylib, binaries)Scripts(.py, .sh, .bat, .js)Java(.jar, .class)
- 🕵️ Threat Intelligence: Extracts and categorizes IPs, URLs, crypto keys, and hardcoded credentials.
- 💎 Premium Dark UI: A beautiful, glassmorphic drag-and-drop web interface with real-time WebSocket progress streaming.
graph LR
A[📁 Drop File] --> B(🕵️ Static Analysis)
B -->|Metadata, Strings, Imports| C(🔧 r2 Disassembly)
C -->|ASM & Flow| D(📝 Decompilation)
D -->|Pseudo-C Code| E{🧠 AI Engine}
E -->|Vulns & Fixes| F[📊 Risk Report]
style A fill:#00f0ff,stroke:#0f111a,stroke-width:2px,color:#000
style E fill:#8b5cf6,stroke:#0f111a,stroke-width:2px,color:#fff
style F fill:#ff007f,stroke:#0f111a,stroke-width:2px,color:#fff
- Python 3.9+
radare2(Required for ASM and decompilation)
Use our auto-installer to set up the Python virtual environment and grab radare2 + plugins automatically:
git clone https://github.com/mrceha/ReversAI.git
cd ReversAI
chmod +x setup.sh
./setup.shClick to view manual installation steps
- Clone & venv:
git clone https://github.com/mrceha/ReversAI.git cd ReversAI python3 -m venv venv source venv/bin/activate pip install -r requirements.txt
- Install radare2:
- macOS:
brew install radare2 - Linux:
sudo apt install radare2
- macOS:
- Install r2dec plugin:
r2pm -i r2dec
ReversAI uses AI to do the heavy lifting for vulnerability detection. You'll need an API key.
- The
setup.shscript automatically creates a.envfile. (Orcp .env.example .env). - Open
.envand paste your key:
# Use OpenAI...
OPENAI_API_KEY=sk-your-openai-key-here
AI_PROVIDER=openai
# ...or Anthropic
ANTHROPIC_API_KEY=sk-ant-your-anthropic-key-here
AI_PROVIDER=anthropic(Note: If you don't provide an API key, ReversAI will still perform static analysis, decompilation, and security checks—it will just skip the final AI reasoning step).
- Start the FastAPI backend server:
source venv/bin/activate python backend/main.py - Open your browser and navigate to: http://localhost:8000
- Drag and drop any binary to begin analysis!