rizinorg/cutter
↗ GitHubFree and Open Source Reverse Engineering Platform powered by rizin
18,606
Stars
1,349
Forks
301
Watchers
505
Open Issues
Safety Rating A
No hardcoded secrets, malicious code patterns, suspicious dependencies, or prompt injection attempts were detected. The repository is a well-established, widely-starred open-source reverse engineering tool (18,000+ stars) with a transparent GPL v3.0 license, active CI/CD pipelines, and a reputable community. All content analyzed is consistent with a legitimate security tooling project.
ℹAI-assisted review, not a professional security audit.
AI Analysis
Cutter is a free and open-source, cross-platform reverse engineering platform with a graphical user interface powered by the rizin framework. It provides a feature-rich environment for binary analysis, disassembly, debugging, decompilation (via rz-ghidra plugin), and code visualization, targeting security researchers and reverse engineers. It supports Python and native C++ plugins and is available for Linux, macOS, and Windows.
Use Cases
- Binary analysis and disassembly of executables
- Malware analysis and reverse engineering
- Debugging native binaries
- Decompilation using the integrated Ghidra decompiler plugin
- Security vulnerability research and CTF (Capture the Flag) challenges
- Code coverage visualization with DynamoRIO integration
Tags
Project Connections
Kavach
→Kavach monitors AI agents at runtime with behavioral enforcement, honeypot tripwires, and forensic audit logs; Cutter provides deep static binary analysis and decompilation via the rizin framework. Together they cover both dynamic runtime defense and static binary threat analysis for security-focused teams.
Strix
→Strix automatically discovers and validates vulnerabilities in running applications using multi-agent AI security testing; Cutter provides the deep binary reverse engineering capability to analyze root causes and understand obfuscated or malicious code identified during automated scanning.
guardian-cli
→guardian-cli automates penetration testing intelligence gathering, tool execution, and reporting across 19 security tools; Cutter complements it with deep binary decompilation and static analysis for the manual investigation phase that follows automated discovery and exploitation.