
curl --proto '=https' --tlsv1.2 -sSfL https://sh.vulhunt.re | shirm https://ps.vulhunt.re | iexVulHunt goes beyond signature matching and version inference. Write Lua rules that leverage dataflow analysis, code pattern matching, and decompilation to detect known and unknown vulnerabilities in POSIX binaries and UEFI firmware.
Trace attacker-controlled input to dangerous sinks across function calls. Detect command injection, buffer overflows, and use-after-free with sanitizer support.
Search decompiled code for vulnerability patterns using Weggli-based queries. Architecture-independent detection that generalizes across x86 and ARM binaries.
A unified Intermediate Representation based on Ghidra's PCode lets one rule work across x86 and ARM, 32- and 64-bit, POSIX binaries and UEFI firmware.
Findings annotate decompiled code at exact instruction addresses, pinpointing the root cause. Type libraries and FLIRT signatures make results explainable even for stripped binaries.
Use MCP and skills as part of agentic workflows to automate vulnerability triage, rule generation, and patch analysis.
Integrate with your already existing tools and platforms, such as Binary Ninja, and Binarly's Transparency Platform, or extend VulHunt's capabilities by directly modifying the core analysis engine.
Install via a one-liner, pull the Docker image, or build from source. VulHunt runs on Linux, macOS, and Windows.
Write Lua rules that use dataflow analysis, code pattern matching, and decompilation to detect vulnerabilities in binaries.
Run VulHunt against your target binaries or firmware images and get annotated results pinpointing the root cause in decompiled code.
Review findings with pretty-printed output or integrate machine-readable JSONL streams into your security pipeline.
VulHunt Community Edition is developed by Binarly's REsearch team and is fully open source.
Install it, write your first rule, and scan a binary in minutes.