What is Dr.Binary?
Dr. Binary is an LLM-powered, agentic assistant designed to make advanced binary analysis accessible to everyone—whether you’re a security researcher, reverse engineer, firmware developer, or simply curious about what’s inside your binaries.
Core idea:
Instead of just enhancing existing analysis tools with AI, Dr.Binary enhances the LLM itself with tool-driven capabilities like disassembly, binary diffing, firmware unpacking, and vulnerability detection. This allows the AI to execute analysis workflows end-to-end rather than just giving static suggestions.
What it can do:
Reverse engineering: Understand code logic from binaries, firmware, or executables.
Vulnerability detection: Identify known and potential security flaws.
Malware analysis: Classify and explain malicious behavior.
Binary diffing: Compare different versions to spot security patches or hidden changes.
Firmware analysis: Inspect embedded system images for backdoors or vulnerabilities.
Supply chain security: Detect tampering or injected malicious code.
Who uses it:
Security researchers
Malware analysts
Incident responders
Firmware and embedded security teams
Developers validating third-party code
CTF (Capture The Flag) competitors looking to speed up binary exploitation and reversing challenges
How to use it:
Just ask!
Advanced Features
Edit and execute your script in Dr.Binary's sandbox
Dr. Binary can write scripts and execute them in the sandbox to help solve your problems. It may occasionally make mistakes when generating scripts. In such cases, you can edit the scripts directly in the chat window. Editing is simple — clicking on a Python script in the file view or a created document opens the code editor, where you can view, modify, and execute Python code in our sandboxed environment.
Use Your Own AI Models
Want to use your own AI models? Just add them through Manage Models — and the best part is, using your own models comes with no token charges from us.
Connect Your MCP Servers
Have an MCP server with new analysis capabilities, or want Dr.Binary to work with your existing workflow tools like Slack, SIEM, or GitHub CI/CD? No worries — just connect via MCP servers, and Dr.Binary can automatically call them.
It's simple! Just add a MCP config to Dr.Binary. The sample MCP config can be found at https://code.visualstudio.com/docs/copilot/chat/mcp-servers#_configuration-example.
Inspect your PC via Local Cyber Assistant
Local Cyber Assistant extends Dr. Binary’s AI capabilities directly to your host environment, giving you controlled, local access to file systems, registries, and scripting. Investigate compromises, run forensic checks, collect artifacts, and execute safe remediation commands — all from within a chat window. Designed for SOC analysts, IR teams, and security engineers who need speed, precision, and operational control. Details can be found here
Download the data
After updating and analyzing the binary file, you can download the Ghidra project file (.gzf) for further local analysis. Alternatively, you can archive all decompiled code into a ZIP file. We're also working on expanding our data download capabilities.