A comprehensive binary analysis and security research platform designed to help software developers identify and strengthen vulnerabilities in their own licensing and protection systems.
- Multi-Format Binary Analysis: PE, ELF, Mach-O support
- Protection Detection: Anti-debug, packing, obfuscation identification
- Vulnerability Research: Buffer overflows, format strings, integer overflows
- Exploitation Framework: Advanced exploit development and testing
- Network Analysis: Traffic capture, protocol fingerprinting, license server emulation
- AI/ML Integration: Multiple AI providers with dynamic model fetching (OpenAI, Anthropic, Google, Local models)
- Template-Free Design: No hardcoded templates or rigid patterns - AI generates adaptive, context-aware code and responses
- GPU Acceleration: NVIDIA, AMD, and Intel GPU support for intensive operations
- Parallel Processing: Multi-core processing support via Python multiprocessing
- Symbolic Execution: Advanced path exploration and constraint solving
- Dynamic Analysis: Runtime behavior analysis and instrumentation
- C2 Infrastructure: Command and control capabilities for security testing
- Modern GUI: Built with PyQt6 for Windows 11 compatibility
- Three-Panel Layout: Professional IDE-like interface with tabs and output panel
- Hex Editor: Built-in viewer/editor with pattern highlighting and data inspection
- AI Assistant Tab: Integrated AI-powered analysis and script generation
- Embedded Terminal: Full-featured terminal emulator with multi-session support and PTY integration
- Plugin System: Extensible architecture for custom tools
- Real-time Logging: Comprehensive logging with adjustable verbosity
- OS: Windows 11
- Python: 3.12+ (required for full functionality)
- RAM: 8GB minimum (16GB recommended)
- Disk: 5GB free space (for all tools and dependencies)
- CPU: 4 cores minimum
- GPU: NVIDIA, AMD, or Intel GPU with appropriate drivers
- Ghidra: For advanced decompilation
- radare2: For additional analysis capabilities
1. Install Pixi package manager:
# Windows (PowerShell)
iwr -useb https://pixi.sh/install.ps1 | iex
# Or via winget
winget install prefix-dev.pixi2. Install just command runner:
# Windows (via winget)
winget install --id Casey.Just -e
# Or via scoop
scoop install just
# Or via cargo (after running 'just install')
pixi run cargo install justNote: Rust, Node.js, radare2, and git are automatically installed by pixi.
Rustup and JDK 21 are installed via winget during just install.
-
Clone the repository
git clone https://github.com/Zachanardo/Intellicrack.git cd Intellicrack -
Run automated setup
# Installs all dependencies + Intel XPU + linters + Rust build just installThis automatically runs:
pixi install- Installs all Python/Conda dependenciesrustup update stable- Updates Rust toolchain to latest- JDK 21 installation (system-wide via winget)
- Latest Ghidra download and installation to
tools/ghidra/ - Latest radare2 download and installation to
tools/radare2/ - Latest QEMU download and installation to
tools/qemu/ - Intel XPU PyTorch installation (for Intel GPU acceleration)
- ESLint + Markdownlint installation
- Rust launcher build (release mode)
If you prefer step-by-step installation:
-
Install base dependencies
pixi install
-
Run post-install setup
pixi run setup
# Activate pixi shell
pixi shell
# Or run commands directly
pixi run intellicrack --help
pixi run intellicrack-guiIntellicrack automatically manages dependencies for Windows 11:
- Primary Engine: angr (full Windows 11 support)
- GPU Support: Intel Arc B580 detection with GIL crash prevention
- All Windows 11 users get a fully functional system
- angr: Windows 11 optimized, installed by default, recommended for all users
- Built-in fallback: For minimal functionality
Launch the graphical interface:
# Using the Rust launcher (recommended)
./intellicrack-launcher/target/release/Intellicrack.exe
# Using module mode
python -m intellicrack --gui# Analyze a binary
python -m intellicrack analyze target.exe
# Quick vulnerability scan
python -m intellicrack scan --vulns target.exe
# Extract strings
python -m intellicrack strings target.exefrom intellicrack.core.analysis import BinaryAnalyzer
analyzer = BinaryAnalyzer()
result = analyzer.analyze_binary("target.exe", {
"deep_scan": True,
"detect_protections": True
})
print(f"File type: {result.file_format}")
print(f"Protections: {result.protections}")Intellicrack features an embedded terminal emulator for interactive process execution and activation workflows.
- Full PTY Support: Windows ConPTY integration for native terminal experience
- Multi-Session Management: Create and manage multiple terminal sessions simultaneously
- ANSI Color Support: Full color and formatting support for terminal output
- Smart Auto-Navigation: Interactive processes automatically switch to Terminal tab
- Process Control: Start, stop, and monitor processes with real-time feedback
- Copy/Paste: Full clipboard integration with right-click context menu
- Scrollback Buffer: Configurable buffer (10,000 lines default) with export functionality
The integrated Activation Tools provide streamlined access to licensing analysis capabilities:
Windows Activation:
- Interactive menu-driven activation via embedded terminal
- Real-time activation status checking
- Multiple activation method support (HWID, KMS38, Online KMS)
- No external console windows - all operations within Intellicrack GUI
Adobe Product Activation:
- Frida-based injection for Adobe licensing analysis
- Interactive terminal-based workflow
- Live process monitoring and feedback
-
Access Activation Tools:
- Navigate to Tools tab → Activation Tools sub-tab
- Click "Check Windows Activation Status" for current status
- Click "Activate Windows (Interactive)" to launch activation workflow
-
Interactive Terminal:
- Automatically switches to Terminal tab when activation starts
- Full menu interaction with keyboard input
- Real-time process output with color formatting
- Use Ctrl+C to interrupt, right-click for copy/paste
-
Manual Terminal Usage:
- Navigate to Terminal tab (7th tab, between Tools and Settings)
- Click "+" to create new terminal session
- Execute custom commands and scripts interactively
For detailed terminal usage instructions, see the Terminal Tab User Guide.
Comprehensive documentation is available in the docs/ directory:
- Architecture Overview
- User Guide
- Terminal Tab User Guide
- Terminal Widget API Documentation
- Terminal Migration Guide
- AI Assistant Guide
- AI Models Quick Reference
- Plugin Development
- GPU Acceleration Guide
- Security and Ethics
Intellicrack uses JSON configuration files. Key settings include:
{
"analysis": {
"timeout": 300,
"parallel_threads": 8,
"enable_gpu": true
},
"logging": {
"level": "INFO",
"enable_comprehensive_logging": true
}
}See the Configuration Reference for details.
Extend functionality with custom plugins:
from intellicrack.plugins import PluginBase
class MyPlugin(PluginBase):
def __init__(self):
super().__init__()
self.name = "My Custom Plugin"
def run(self, binary_data, **kwargs):
# Your analysis logic here
return resultsSee the Plugin Development Guide for more information.
from intellicrack.core.analysis import BinaryAnalyzer
# Analyze executable
analyzer = BinaryAnalyzer()
result = analyzer.analyze_binary("protected.exe")
print(f"SHA256: {result.hashes['sha256']}")
print(f"Entropy: {result.entropy}")from intellicrack.protection import ProtectionDetector
detector = ProtectionDetector()
protections = detector.detect("app.exe")
for protection in protections:
print(f"{protection.type}: {protection.description}")from intellicrack.core.network import NetworkTrafficAnalyzer
analyzer = NetworkTrafficAnalyzer()
analyzer.start_capture()
# ... run target application ...
packets = analyzer.stop_capture()- Import Errors
Solution: Ensure all dependencies are installed from requirements.lock
- GPU Not Detected
Normal in WSL/VMs - CPU fallback will be used automatically
- Qt Warnings
PyQt6 warnings can be ignored - application functions normally
- Intel Arc Graphics Issues
Intel Arc B580 GPU issues are automatically detected and handled
GIL crash prevention is built-in
- Slow Analysis
Enable GPU acceleration or increase parallel_threads in config
Enable detailed logging for troubleshooting:
{
"logging": {
"level": "DEBUG",
"enable_comprehensive_logging": true
}
}We welcome contributions! Please see our Contributing Guide for details on:
- Code style guidelines
- Development setup
- Pull request process
- Bug reporting
This project is licensed under the GNU General Public License v3.0 - see the LICENSE file for details.
Intellicrack is developed for defensive security research to help software developers:
- Identify weaknesses in their own licensing protection mechanisms
- Test robustness of their protection implementations in controlled environments
- Strengthen defenses against potential attacks by understanding attack vectors
- Validate security of their own software before deployment
This tool is for educational and authorized security research purposes only. Users are responsible for complying with applicable laws and regulations. The authors assume no liability for misuse or damage caused by this software.