Analyze malware samples to understand their behavior and find vulnerabilities without running them.
Debug a compiled binary when you don't have access to the original source code.
Learn how programs work at the machine level by stepping through assembly code.
Reverse engineer proprietary software to understand its logic or recover lost functionality.
Requires building C++ with Qt dependencies and Rizin/Ghidra integration; pre-built binaries may be available but source compilation is common.
Cutter is a free, open-source graphical desktop application for reverse engineering, the practice of analyzing compiled software to understand how it works, find security vulnerabilities, or recover logic from a program when you don't have the source code. It is powered by rizin, a command-line reverse engineering framework, and wraps it in a visual interface so you can explore binary files without memorizing command-line syntax. The tool gives you a visual disassembler (which converts compiled machine code back into human-readable assembly instructions), a graph view of code flow, a debugger for stepping through programs, and a hex editor for inspecting raw bytes. It supports plugins written in Python or C++, including a native integration with the Ghidra decompiler, Ghidra being a separate reverse engineering tool from the NSA that can convert assembly back into approximate C code, which is much easier to read. You would use Cutter if you are a security researcher analyzing malware, a developer debugging a compiled binary you don't have source for, or a student learning how programs work at the machine level. It runs on Linux, macOS, and Windows. It is written in C++ and built on Qt for its graphical interface.
Generated 2026-05-18 · Model: sonnet-4-6 · Verify against the repo before relying on details.