← Back to Home

Genus CodesPlugins

Genus Codes Binary Ninja plugin screenshot

Binary Ninja Plugin v1.0.0

Analyze functions in Binary Ninja against the Genus Codes database. Identify known code, detect malware signatures, and discover binary relationships directly from the disassembler. Filter results by binary similarity, malicious/benign classification, recents history, and projects.

Login to Download
SHA256 Checksum
f578ed96b524e16d1ca64eb3ce149f0fbbbe47fbc93899b011c403879feada9f

Installation

  1. Download the zip file above.
  2. Extract the zip into your Binary Ninja plugins directory:
    macOS: ~/Library/Application Support/Binary Ninja/plugins/
    Linux: ~/.binaryninja/plugins/
    Windows: %APPDATA%\Binary Ninja\plugins\
  3. The genus_codes/ folder should be directly inside plugins/.
  4. Restart Binary Ninja.

API Key Setup

  1. Go to your Account page on genuscodes.com.
  2. Under "API Tokens", enter a name (e.g. "Binary Ninja") and click Create Token.
  3. Copy the gc_... token — it is only shown once.
  4. In Binary Ninja: Settings (Ctrl+, / Cmd+,) → search for "Genus" → paste the token into the API Token field.
  5. The API Server URL defaults to https://genuscodes.com — no changes needed.

Usage

  1. Open any binary in Binary Ninja.
  2. Go to Tools → Genus Codes → Show Analysis Widget.
  3. Click Analyze All Functions to scan all functions against the database.
  4. Results show per-function: "Unique", "Found in X binaries", or "Error".
  5. Click a function row to view its matched binaries in the table below.
  6. Double-click any row to navigate to that function in the disassembly.
  7. Right-click a row for additional options (analyze single function, copy hash).
  8. Adjust Threads (1–10) to control concurrency.

Filtering

After analysis completes, use the filter controls to narrow results. All filters stack (AND logic).

Click Refresh to re-fetch your recents and project list from the server. Both the function table and the matched binaries table update when filters change.