Want to Join Us ?

you'll be able to discuss, share and send private messages.

Release Relyze Binary Interactive Software Analysis

Discussion in 'Reverse engineering' started by storm shadow, May 8, 2015.

Share This Page

  1. storm shadow

    Techbliss Owner Admin Ida Pro Expert Developer

    Interactive Software Analysis
    Relyze lets you analyse and understand native x86 and x64 Windows software


    Analyse and explore PE files

    Relyze has extensive coverage for the Portable Executable (PE) file format, letting you understand a binaries composition and leverage this rich meta data for analysis. Symbol formats such as PDB, embedded COFF and MAP files can also be loaded to further enrich the analysis.

    First look

    Use the analysis overview to get a quick insight into a binary. Displaying information about the file, its associated hashes, embed file information, available security mitigations, analysis information, entropy graphs and any embedded security certificates.
    • [​IMG]
    1. 1
    2. 2

    Visualise the data

    Use the entropy graph to identify packed or encrypted data and other anomalies. The entropy graph overlays corresponding file sections and is interactive so you can navigate into the structure or code views in order to learn more.

    Explore the structure

    Drill down into a files structure in order to see exactly how it is composed. Explore the structure further with the hex editor, decoding and searching for data on the fly.

    Analyse both x86 and x64 code

    Relyze lets you analyse both x86 and x64 code, and comes with support for numerous instruction set extensions. The plugin framework exposes detailed instruction properties including operand access and flags modified.

    Navigate control flow graphs

    Relyze visualizes functions with interactive control flow graphs, allowing you to navigate a functions code paths and interact with local variables, instructions and other properties.

    Function analysis

    Automatic analysis identifies functions, their parameters and other meta data such as calling conventions. A functions local variables are automatically analysed and displayed in the functions control flow graph so you can interact with them, discovering references to locals, updating their data types and more.

    See all the code paths

    Get the complete control flow graph for a function with automatic jump table and exception handler analysis. Discover code paths that would otherwise not be visible.

    Resolve indirect calls

    When possible analysis can resolve indirect call targets to give you the complete picture of a functions logic.

    Find everything

    Quickly search for and identify interesting parts of the analysis or browse through everything. Items such as segments, imports, exports, functions, strings, bookmarks, symbol lines and search results are consolidated in a unified location for easy traversal.

    Data type analysis

    Automatic analysis discovers data and identifies suitable data types either through analysis or via assistance from symbols when available. Identify primitive types, strings, complex structures and more.

    Create and manage custom data types

    Manage the available data types and create new types by defining them using C/C++ declarations. You can also import C/C++ header files in order to access the data types defined within them. Export the available data types as C/C++ headers for interoperability with your own tools.

    Visualise relationships

    Discover the relationships between code and data with interactive reference graphs. You can generate reference graphs either to specific targets or originating from specific targets. Interact with these reference graphs and navigate through the code and data you discover.

    Find paths

    Use graph path highlighting to discover all the paths between any two nodes in a graph. Identify the shortest path to an interesting code block, or all the potential paths to some data in a reference graph.

    Custom address modes

    Display and navigate code based on either relative virtual addresses or virtual addresses. Instantly re-base a binary to a new virtual base address, great when you are using Relyze with your debugger and have to deal with address space layout randomization (ASLR).

    Expand with plugins

    Leverage a rich Ruby plugin framework in order to expand Relyze with new capabilities and perform tailored analysis or research against a binary. An integrated plugin editor lets you quickly test out your ideas and everything runs as expected straight out of the box, no additional configuration or third party libraries required.

    Archive everything

    Use the integrated library manager to archive every file you analyse so you can build up a corpus over time. Apply your archives with custom tags and descriptions in order to easily find and categorize them.

    Automated batch analysis

    Process large amounts of files via built in batch analysis. Batch analysis runs in parallel in order to blaze through multiple files quickly, automatically tagging and archiving them to your library.

    Multi tab design

    Use the GUI's multi tab design to navigate between modules for a fluid analysis experience. Double clicking on an import from one module will navigate you to the corresponding export in another model.

    Custom GUI themes

    The GUI is fully themeable in order to give you the best viewing experience.
    • [​IMG]
    1. 1

    Rip Cord likes this.
  2. VIP

    New Member

    • VIP
    • Jul 17, 2015
    • 1
    • 0
    is There any Full or Cracked version Avalibe ?
  3. CryptX0r


    Pretty interesting application. Still a bit unrefined and a bit clumsy imo but the GUI is really modern and minimalistic which I rather like :)
    hypnz and storm shadow like this.