ant4g0nist

ant4g0nist / pyre

Public

Ghidra decompiler in your browser

47
3
100% credibility
Found May 06, 2026 at 47 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
TypeScript
AI Summary

Pyre is a client-side web application that runs Ghidra's decompiler in the browser to analyze and display human-readable C code from binary executables like ELF, Mach-O, PE, and WASM files.

How It Works

1
🔍 Discover Pyre

You find Pyre, a handy web tool that lets you peek inside compiled programs like ELF or Mach-O files right in your browser.

2
🛠️ Set it up

Follow simple instructions to prepare the special language files and launch the webpage on your computer.

3
🌐 Open the app

Visit the local webpage and see a clean screen ready for your file.

4
🗂️ Drop your file

Drag any supported program file onto the screen, and it loads safely without sending anywhere.

5
📋 Browse functions

A list of the program's building blocks appears – pick one to explore.

6
📖 See the code

Click a function, and it instantly turns into readable C code you can understand.

7
🔗 Navigate around

Click on calls to open new tabs, check connections in the side panel, and dig deeper.

Unlock the secrets

You now see exactly how the program works, all privately in your browser, feeling like a detective who cracked the code.

Sign up to see the full architecture

6 more

Sign Up Free

Star Growth

See how this repo grew from 47 to 47 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is pyre?

Pyre ports Ghidra's C decompiler to the browser via TypeScript, React, and WebAssembly, letting you drag ELF, Mach-O, PE, or WASM binaries for instant decompilation. It parses sections into virtual regions, lazy-loads architecture specs, and renders functions as editable C in a Monaco editor with function lists, cross-references, and Cmd-click navigation to callsites. Client-side only: no servers, no telemetry, runs on ghidra decompiler Linux, Windows, or anywhere with a browser.

Why is it gaining traction?

Zero setup beats Ghidra decompiler CLI installs or ghidra decompiler plugin tweaks—no emsdk, JDK, or Ghidra download needed, unlike the full ghidra github repo suite. Monaco's syntax highlighting spots Ghidra idioms like FUN_0xaddr or iVar1 instantly, and xref panels track callers/callees without manual greps. Privacy wins over cloud tools; pyre code github stays local even for sensitive malware.

Who should use this?

Reverse engineers triaging x86/AArch64/WASM samples without launching Ghidra. CTF solvers fixing ghidra decompiler not working mid-contest on Linux/Mac. Security analysts sharing decompiled snippets via static builds, skipping ghidra decompiler parameter ID hunts.

Verdict

Promising alpha (47 stars, 1.0% credibility score) with solid README and Docker for quick spins, but limited arch support means it's not production-ready. Try for lightweight recon; graduate to Ghidra releases for polish.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.