AI-Powered Reverse Engineering Platform

Crack Any Binary.In Seconds.

Upload an executable. Get a forensic-grade intelligence report. Kernel Lab strips packers, decompiles assembly, and surfaces secrets, license logic and crypto constants — automated, sandboxed, and always sub-second.

binai-cli — analysis output
$binai analyze --target crackme_v3.exe --tier pro
› reading PE32+ headers .................. ok (4.2 MB)
› entropy scan ............................ 7.94 (compressed)
› signature match ......................... 12 hits
PACKER DETECTED: VMProtect 3.x + UPX Layer
ANTI-DEBUG: IsDebuggerPresent, NtQueryInformationProcess
› unpacking via CPU emulation ............. 1.41s
› LLM decompiler engaged .................. claude-opus-4.6
› reconstructing symbols .................. 312 fns named
AUTH SYSTEM: Online license validation → api.license.io/v2/verify
HWID FINGERPRINT: MAC address + Volume Serial + CPUID hash
CRYPTO: AES-256-CBC + RSA-2048 key exchange
› generating YARA rules ................... 7 patterns
› writing pdf report ...................... report_2c4f.pdf
$
Try It Now
Step 01 / Upload Binary
upload_file
Drag & Drop Your Binary Here
— or click to browse files —
.EXE.DLL.APKPython (compiled)C# / .NET
10ms
Analysis Speed
99.8%
Success Rate
50K+
Daily Files
120+
Global Nodes
// Core Modules

Core Capabilities

inventory_2
Universal Unpacker
Automated removal of multi-layer protection including VMProtect, Themida, UPX, and custom packers. CPU-emulation based, sandboxed, deterministic.
Open Unpacker arrow_forward
psychology
LLM Decompiler
Transforms raw assembly into human-readable C-style pseudo-code with semantic function naming, type recovery, and inline commentary.
security
Threat Detection
Heuristic-based discovery of zero-day vulnerabilities, suspicious imports, and hidden logical flaws deep within obfuscated binaries.
// Plans & Tiers

Transparent Pricing

Free Tier
$0
Forever
  • 3 lifetime uploads
  • PE header parsing
  • Strings extraction
  • Packer detection
  • AI explanations
  • PDF reports
Month
$20/mo
Billed monthly
  • 40 uploads / month
  • AI explanations
  • Full PDF reports
  • Unpacker 10/day
  • Malware classifier
  • YARA generator
Year
$150/yr
$12.50/mo effective
  • Everything in 6-Month
  • Binary diff engine
  • YARA rule generator
  • REST API access
  • 30-day file retention
  • Email support
Team
$250/mo
5 seats included
  • Everything in Year
  • 5 seats included
  • Custom report branding
  • Shared history & tagging
  • SLA + dedicated support
  • SSO available
// Common Questions

Frequently Asked Questions

Is my uploaded binary shared with anyone?add
No. Every binary executes inside a strict per-tenant isolation sandbox with no outbound network. Files are stored encrypted at rest, never executed, and permanently deleted after 24 hours.
Can it unpack VMProtect or Themida?add
Yes. The unpacker uses full CPU emulation plus memory-dump reconstruction to bypass virtualization-based protectors. Coverage includes VMProtect 1.x–3.8, Themida 2.x–3.x, Enigma, UPX, ASPack, PyInstaller and 40+ commercial packers.
What happens if I reach my quota?add
Free accounts get 3 lifetime uploads. Monthly tier allows 40 uploads/month and 10 unpacks/day. 6-Month, Year and Team tiers are uncapped for normal usage.
Do the AI explanations work on raw assembly?add
Yes. Our decompiler is fine-tuned on x86, x86-64, ARM64 and MSIL (.NET IL). You can paste raw disassembly into the explainer at any time.