sgInnora

AI-Powered Autonomous Binary Reverse Engineering CLI — the native reverse engine from Innora-Sentinel. Local LLM inference (MLX), MPS GPU acceleration, multi-round iterative analysis, zero API cost.

37
12
100% credibility
Found Feb 06, 2026 at 16 stars 2x -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

An open-source AI tool that automatically analyzes binary program files to decompile functions, detect vulnerabilities, predict names, and generate readable reports, designed for local use on Apple Silicon Macs.

How It Works

1
🕵️ Discover the Magic Tool

You hear about sentinel-reverse, a smart helper that unlocks the secrets hidden inside computer program files without needing expert skills.

2
💻 Set It Up on Your Mac

You easily install the tool on your Apple computer, getting everything ready in moments.

3
🧠 Add the Thinking Brain

You download a free AI brain that lets the tool understand and explain code like a human expert.

4
📁 Pick Your Mystery File

You select the program file you want to explore, like an app or software executable.

5
Choose Your Adventure
Quick Peek

Get a fast summary to quickly spot the basics.

🔬
Deep Dive

Uncover every detail, vulnerabilities, and hidden logic.

6
Watch It Work

You start the analysis and see progress updates, pausing and resuming anytime if needed.

📄 Unlock the Secrets

You receive beautiful, easy-to-read reports explaining what the program does, naming functions, spotting risks, and more.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 16 to 37 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is sentinel-reverse?

Sentinel-reverse is a Python CLI that automates binary reverse engineering using local AI models on Apple Silicon. Drop in an ELF, PE, Mach-O, APK, or .NET bundle, run `sentinel-reverse /path/to/binary -m security`, and get decompiled C code, function names, vulnerability reports, and algorithm detection in Markdown and JSON outputs. It slashes manual disassembly time from days to hours via GPU-accelerated, iterative AI analysis with zero API costs.

Why is it gaining traction?

Unlike Ghidra or IDA Pro's manual grind, it delivers 50-200 functions/hour locally with MLX LLM inference and MPS acceleration, keeping data private. Modes like quick, exhaustive, or security_audit adapt to needs, with resume-from-checkpoint for big binaries. Among ai powered github projects, its full offline workflow hooks reverse engineers tired of cloud dependencies.

Who should use this?

Malware analysts triaging samples faster than radare2 scripting. Vulnerability researchers auditing Android APKs or Windows EXEs. CTF players needing quick decompiles during comps. Security auditors dissecting .NET bundles or firmware without licensing fees.

Verdict

Worth testing on M-series Macs with 32GB+ RAM for its raw speed in ai powered reverse sentinel workflows—docs and CLI are solid for beta. But 23 stars and 1.0% credibility signal early days; bugs likely, so fork and contribute if production-ready matters.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.