Tool
GUI
Penetration Testing & Red Teaming

cutter

by rizinorg

18.3Kstars
1.3Kforks
299watchers
Updated 19 days ago
About

Cutter is a free and open-source, user-friendly reverse engineering platform powered by rizin, designed for advanced binary analysis and customization.

Free and Open Source Reverse Engineering Platform powered by rizin

Primary Use Case

Cutter is primarily used by reverse engineers, security researchers, and malware analysts to perform binary analysis, debugging, and exploitation tasks. It provides an accessible graphical interface to the rizin framework, enabling detailed inspection and manipulation of executable files across multiple platforms.

Key Features
  • Graphical reverse engineering platform powered by rizin
  • Cross-platform support: Linux, macOS, Windows
  • Supports Python and native C++ plugins for extensibility
  • Integration with external tools like Ghidra decompiler
  • Pre-built binaries and Docker image available for easy deployment
  • Advanced and customizable user experience tailored for reverse engineers
  • Community-driven with active support channels
  • Supports exploitation, malware analysis, and forensics workflows

Installation

  • Linux: Download the .AppImage from GitHub Releases, make it executable with 'chmod +x Cutter*.AppImage', then run './Cutter*.AppImage'
  • Linux: Alternatively, install from your distribution's package manager if available (package names: cutter, cutter-re, rz-cutter)
  • Linux: Use OBS repositories for some distributions via https://software.opensuse.org/package/cutter-re
  • macOS: Download the .dmg file from GitHub Releases or install via Homebrew Cask with 'brew install --cask cutter'
  • Windows: Download the .zip archive from GitHub Releases
  • Windows: Install via Chocolatey with 'choco install cutter'
  • Windows: Install via Scoop with 'scoop bucket add extras' then 'scoop install cutter'
  • Build from source: Follow instructions at https://cutter.re/docs/building.html
  • Use Docker: Deploy using the provided Dockerfile and instructions in the docker/README.md

Usage

>_ chmod +x Cutter*.AppImage; ./Cutter*.AppImage

Make the Cutter AppImage executable and run it on Linux

>_ brew install --cask cutter

Install Cutter on macOS using Homebrew Cask

>_ choco install cutter

Install Cutter on Windows using Chocolatey

>_ scoop bucket add extras && scoop install cutter

Add extras bucket and install Cutter on Windows using Scoop

Security Frameworks
Reconnaissance
Resource Development
Initial Access
Execution
Defense Evasion
Usage Insights
  • Integrate Cutter with automated exploit frameworks like Metasploit to streamline red team operations.
  • Leverage Cutter’s plugin system to develop custom detection signatures for blue team malware analysis.
  • Use Cutter in purple team exercises to bridge gaps between offensive findings and defensive tuning.
  • Deploy Cutter within sandbox environments to enhance forensic investigations and malware reverse engineering.
  • Incorporate Cutter into continuous integration pipelines for proactive binary security assessments.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about cutter. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team90%
Blue Team40%
Purple Team70%
Details
LicenseGNU General Public License v3.0
LanguageC++
Open Issues1687
Topics
cutter
gui
reverse-engineering
security
debugger