Software Alternatives & Reviews

Malcat VS Binary Ninja

Compare Malcat VS Binary Ninja and see what are their differences

Malcat logo Malcat

Malcat is a feature-rich hexadecimal editor / disassembler for Windows and Linux for malware analysts, incident responders, CTF players and SOC operators.

Binary Ninja logo Binary Ninja

A reverse engineering platform and GUI
  • Malcat Landing page
    Landing page //
    2021-11-12

Malcat is a feature-rich hexadecimal editor / disassembler for Windows and Linux targeted to IT-security professionals. Inspect dozens of binary file formats, dissassemble and decompile different CPU architectures, extract embedded files and scan for Yara signatures or anomalies in a fast and easy-to-use graphical interface. Don't like what you get? Malcat is also heavily customizable and scriptable using python.

  • Binary Ninja Landing page
    Landing page //
    2023-09-28

Malcat

Website
malcat.fr
$ Details
freemium €50.0 / Annually
Platforms
Windows Linux
Release Date
2022 January

Binary Ninja

Pricing URL
-
$ Details
Platforms
-
Release Date
-

Malcat videos

No Malcat videos yet. You could help us improve this page by suggesting one.

+ Add video

Binary Ninja videos

Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1

More videos:

  • Demo - 312 Using Binary Ninja for Modern Malware Analysis Dr Jared DeMott Mr Josh Stroschein
  • Review - Binary Ninja Overview

Category Popularity

0-100% (relative to Malcat and Binary Ninja)
Software Development
26 26%
74% 74
IDE
23 23%
77% 77
Decompiler
28 28%
72% 72
Developer Tools
100 100%
0% 0

User comments

Share your experience with using Malcat and Binary Ninja. For example, how are they different and which one is better?
Log in or Post with

Social recommendations and mentions

Based on our record, Binary Ninja should be more popular than Malcat. It has been mentiond 9 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

Malcat mentions (3)

  • How to detect incorrectly named DLL?
    If the DLL exports at least one function (which should be the case), you can look in the ExportDirectory structure of the dll (using CFF explorer or malcat), there is a field at offset 0xC which is a RVA to the DLL's name. Source: about 2 years ago
  • New Binary Template feature in Reverse Engineers' Hex Editor
    Did you try https://malcat.fr ? The free edition seems to check all your boxes. Source: about 2 years ago
  • biodiff: introduction
    If you're into bin diffing, you can give malcat a try. Its diff algorithm is also based on Meyer's algorithm so it can realign, and its view modes let you compare structures as well as code or bytes. Diff mode is only available in paid version though, but the price is fair. Source: about 2 years ago

Binary Ninja mentions (9)

  • [Media] I'm currently learning Rust. Out of curiosity, I opened the resulting binary as a text file, and among the garbled text characters, I saw this weird text. Is this normal or is there something wrong with the compiled binary? It's the "Hello, World!" sample program and it executes normally.
    If you really want to poke around in the binary, you can use a decompiler like IDA, Ghidra, or Binary Ninja's free version. Source: 7 months ago
  • Ida Free
    Still $$$ for crippled functionality. As an alternative, https://binary.ninja is gaining traction at work. - Source: Hacker News / 10 months ago
  • Teaching A Machine To Identify Vulnerabilities (Part 1)
    As I said, a regular text editor won’t do for reading a binary file, so I needed to choose a disassembler to break the challenge binaries out into their basic blocks. I chose to use Binary Ninja because it has a very easy-to-use Python API, and it’s hobbyist-level cheap (for comparison, the industry-standard disassembler is IDA Pro, which they will sell to you for roughly an arm, and continue to pick off your... - Source: dev.to / over 3 years ago
  • Why do most hackers base their personality around hacking?
    It’s an awesome reverse engineering tool (https://binary.ninja). Has really nice api support so you can basically automate anything and make plugins for custom architectures and stuff like that. Source: almost 2 years ago
  • Introducing Decompiler Explorer
    It's basically the opposite of https://godbolt.org/ -- put in binary, get out decompilation amongst many decompilers. It's open source (though you need a Binary Ninja and Hex-Rays license to run internally -- you'll want to check with the respective companies to make sure your particular license is acceptable for use even internally first!). Source: almost 2 years ago
View more

What are some alternatives?

When comparing Malcat and Binary Ninja, you can also consider the following products

IDA - The best-of-breed binary code analysis tool, an indispensable item in the toolbox of world-class software analysts, reverse engineers, malware analyst and cybersecurity professionals.

pestudio - pestudio is a tool allowing to statically analyze malicious files.

Ghidra - Software Reverse Engineering (SRE) Framework

PE-bear - PE-bear is a reversing tool for PE files.

OllyDbg - OllyDbg is a 32-bit assembler level analysing debugger.

X64dbg - X64dbg is a debugging software that can debug x64 and x32 applications.