AI-POWERED · REVERSE ENGINEERING · PLATFORM

Crack Any Binary.
In Seconds.
Powered by Kernel.Su

Upload your EXE, APK, Python (Compiled), or C# application. Kernel Lab instantly maps API calls, authentication systems, and protection layers, and decompiles logic, explaining everything clearly in plain English using AI.

Start Free Analysis See How It Works
revforge — analysis output
$revforge analyze --file crackme.exe --deep
→ Scanning PE headers...
→ Extracting imports/exports...
⚠ PACKER DETECTED: VMProtect 3.x + UPX layer
⚠ ANTI-DEBUG: IsDebuggerPresent, NtQueryInformationProcess
⚠ ANTI-VM: VMware CPUID check, VirtualBox registry probe
✓ AUTH SYSTEM: Online license validation → api.license.io/v2/verify
✓ HWID FINGERPRINT: MAC address + Volume Serial + CPUID hash
→ Feeding to Kernel.Su AI for analysis...
✓ Report generated: 24 findings. Risk Score: 8.7/10
$
4 Core
File Formats
<30s
Analysis Time
12+
Protection Types
AI
Kernel.Su Powered
// CAPABILITIES

What Kernel Lab Detects

Every protection, every API, every authentication pattern — laid bare. Automatically.

🛡️
Protection Stack Detector
Identifies UPX, VMProtect, Themida, Obsidium, MPRESS and 20+ other packers and protectors. We map everything out even if they are stacked and layered.
STATIC ANALYSIS
🔑
Auth System Classifier
Detects hardware fingerprinting, online license validation, local key file checking, trial time limits, and feature flags. It then explains exactly how each element works.
AI EXPLAINED
🌐
Network Traffic Blueprint
Extracts all C2 domains, API endpoints, request headers, and data patterns that the binary communicates with, all without actually running it.
SAFE ANALYSIS
🐛
Anti-Debug / Anti-VM Map
Catches anti-debugging tricks like timing checks, NtQuery calls, CPUID probes, and VMware or VirtualBox registry checks, and lists them all with clear explanations.
EVASION INTEL
🧠
AI Code Explainer
Decompiled pseudocode fed into Kernel.Su. Each function explained in plain English with purpose, logic flow, and security implications noted.
POWERED BY AI
🐍
Python Binary Unpacker
Handles executables compiled with PyInstaller, cx_Freeze, and Nuitka. It extracts and reconstructs the original source structure automatically.
PYTHON RE
🔄
Binary Diff Comparison
Upload two versions of the same binary and it will tell you exactly what changed. It highlights new protections added, functions removed, and vulnerabilities patched.
PRO FEATURE
📋
YARA Rule Generator
Automatically generate production-ready YARA rules from any analyzed binary for threat hunting and malware detection across your network.
SECURITY OPS
⚠️
Malware Classifier
Provides a clear verdict on whether a binary is clean, suspicious, or malicious, complete with full reasoning, IOC extraction, and documented behavioral signatures.
AI VERDICT

How It Works

Three steps from upload to full intelligence report.

01
📤
Upload Your File
Drop any EXE, DLL, APK, Python binary, or compiled script up to 100MB. Your files are sandboxed and are never executed on our servers.
02
⚙️
Automated Analysis
Our engine runs pefile, CAPA, DIE, FLOSS, and 8 other tools against your binary in a secure isolated environment within seconds.
03
🤖
AI Intelligence Layer
All raw findings are fed into our models. They synthesize everything into a structured report in plain English, complete with risk scoring.
04
📄
Download Report
Get a full professional PDF report that includes a protection map, authentication analysis, network blueprint, AI explanations, and ready to use YARA rules.
Drag & Drop Your Binary Here
or click to browse files
.EXE .APK PYTHON (COMPILED) C# APP
// PRICING

Simple, Transparent Pricing

Start free. Upgrade when you need more power. Cancel anytime.

// FREE TIER
$ 0
Forever free · No card needed
  • 3 uploads total
  • PE header analysis
  • Basic string extraction
  • Packer detection
  • AI explanations
  • PDF reports
  • Advanced tools
Get Started Free
// MONTH
$ 20
per month · billed monthly
  • 40 uploads / month
  • Kernel.Su AI explanations
  • Full PDF reports
  • Auth system classifier
  • Network traffic blueprint
  • Anti-debug / Anti-VM map
  • Unpacker / YARA / API
Start Monthly
// YEAR
$ 200
per year · billed annually
  • Unlimited uploads
  • Everything in 6 Month
  • Binary diff comparison
  • YARA rule generator
  • x64dbg script generator
  • REST API access
  • Priority email support
Go Yearly
// TEAM
$ 399
per month · up to 5 seats
  • 5 team seats included
  • Everything in Year
  • Custom report branding
  • Shared analysis history
  • Admin dashboard
  • Dedicated Slack channel
  • SLA guarantee
Contact for Team

All plans include 7-day money-back guarantee · Secure Crypto checkouts via NowPayments

KERNEL.SU ENGINE · RUNNING ON EVERY ANALYSIS · RESULTS IN <30 SECONDS

Join the RE Community

Tutorials, writeups, tool updates, and live sessions. Follow for weekly reverse engineering content.

// FAQ

Common Questions

Is it safe to upload my files?+
Yes. Files are analyzed in a fully isolated sandbox and are never executed. All uploads are encrypted at rest, processed in a sandboxed VM, and permanently deleted within 24 hours. We never share or sell any uploaded files.
Which file types are supported?+
Windows PE files (EXE, DLL, SYS), Android APKs, Python compiled binaries (PyInstaller, cx_Freeze, Nuitka), Linux ELF binaries (SO, ELF), macOS Mach-O files, .NET assemblies, and raw shellcode blobs.
Which AI models power the analysis?+
We primarily use the proprietary Kernel.Su engine for code explanation, report writing, secondary validation, and binary classification tasks.
Is this legal to use?+
Kernel Lab is built for security research, malware analysis, vulnerability research, CTF challenges, and educational purposes. You are responsible for only analyzing files you own or have authorization to analyze. We comply with all DMCA and ethical security research standards.
Can I cancel my subscription anytime?+
Absolutely. Cancel with one click from your dashboard. No questions asked, no cancellation fees. We also offer a 7-day money-back guarantee on all paid plans if you're not satisfied.
Do you offer API access for automation?+
Yes. Year and Team plans include REST API access so you can integrate Kernel Lab directly into your security pipeline, CI/CD workflows, or custom tooling. Full API documentation is available in your dashboard.
// GET STARTED

Start Reversing Right Now

Free tier available. No credit card required. Results in under 30 seconds.

Start Free Analysis Join Discord Community