Native Qt App
Desktop-first product surface

ZARA
RE FRAMEWORK
Built for binary analysis, graph recovery, debugging, and security research.
Zara brings disassembly, decompilation, graph views, runtime inspection, automation, and release-grade packaging into one native product surface. The focus is a workspace that stays useful from target intake through deeper analyst investigation.
Desktop-first product surface
Windows, macOS, Debian, Arch, AppImage
One project model across analysis and runtime
Capabilities
This page is structured around what Zara does in practice: ingest binaries, recover structure, pivot into runtime, and carry project state forward.
Disassembly, control-flow recovery, graph traversal, and workspace-native navigation built around real reverse engineering use.
IR, SSA, type recovery, composite inference, and structured decompilation exposed as part of the product rather than hidden internals.
Breakpoints, runtime state inspection, thread-aware workflows, and debugger-driven pivots back into the static project.
SDK, scripting, release packaging, and follow-on workflows aimed at serious security research rather than a browser demo shell.
Workflow
The sequence below frames Zara as a working reverse engineering environment, not a loose collection of component claims.
Open a binary or project database and move directly into analysis without context switching into separate tools.
Traverse functions, decompilation, control flow, and call relationships from the same workspace surface.
Launch runtime debugging, inspect state, import coverage, and correlate execution back to static structure.
Persist annotations, export artifacts, automate analysis, and keep the project useful beyond the first triage pass.
Release Targets
The release surface is simple: native installer on desktop platforms, distro-native package where it matters, and a portable Linux artifact for broader distribution.