Releases: Euva-Project/EUVA
1.5-stable
What's New?
- Disassembler An iced-based disassembler will help in analyzing binary files and will present the binary file as readable logic.
- Decompiler Decompile x64, x86 binaries and get pseudocode in C/C++ format
- Scripting Decompiler A C# scripting layer that allows you to write custom decompiler scripts and custom decompilation methods.
- AI Agents Decompiler Bring your own API key Cloud or Local via Ollama to instantly restore human-readable variable names and code semantics without UI freezes.
- AI-Explain Now AI can roughly explain decompiled code to you, giving you answers as high-quality as possible. (Experimental feat)
- MCP server integration and deeper AI support
- Interface improvements
- Fixing old bugs
- Added signatures for the decompiler, which allows for more in-depth decompilation
- Added a Regex engine for cosmetic cleaning of decompiled code and further conversion to C++
- Post decompiler 2 is a decompiler that checks the first one, adds humanization, and adds C++ abstractions to achieve readability.
- More flexible hotkey and theme customization system
- Integration with VirusTotal service for automatic file scanning using your API
Core Features
- Memory-Mapped File engine scales to arbitrarily large binaries with zero heap pressure.
- WriteableBitmap renderer bypasses the WPF render pipeline entirely; pixel-perfect output at native DPI.
- GlyphCache subsystem rasterizes each character once and blits it via direct memory copy thereafter.
- Dirty Tracking system features lock-free snapshot reads for zero-latency change visualization.
- Transactional Undo system both step-by-step (Ctrl+Z) and full-session rollback (Ctrl+Shift+Z).
- Structured PE decomposition a layer that turns raw bytes into a navigable semantic tree.
- Scriptable patching DSL (.euv) custom language with live file-watch execution for automated tasks.
- Plugin-extensible detector pipeline modular system for automated packer/protector identification.
- Fully themeable rendering layer persistent theme state across sessions with deep UI customization.
- Added integration with the latest Yara-x engine (Yara, written in Rust), which provides the ability for malware analysis and integration with thousands of ready-made rules for signatures
- The UI design has been redesigned and a new default theme, Catppuccin, has been added.
- A major bug fix, as well as a minor performance improvement and memory leak prevention.
- Improved tool stability old code traps closed
- Byte minimap Allows you to instantly scan the hex grid of a binary file, simplifying research and instantly identifying where packed code or similar may be located.
Release Files hash
EUVA Installer hash - SHA256 FCB8C1C4669DDB522C515D927CF6D79E1F6EBC611806853C308348BBCA5EF234
EUVA.UI Portable hash - SHA256 -A676EBFEC31BA517B19B5413C7D2CFC6842D4885C5660B9E3BE77CCCE6BABC35
EUVA Portable zip file - SHA256 B24FE5BD0FC85DD3CFF1B1B2B62C3C8F51981685941F4DDE4D1991D96238CC80
EUVA: low-level HexEditor
What's New / Highlights
Added integration with the latest Yara-x engine (Yara, written in Rust), which provides the ability for malware analysis and integration with thousands of ready-made rules for signatures
The UI design has been redesigned and a new default theme, Catppuccin, has been added.
A major bug fix, as well as a minor performance improvement and memory leak prevention.
Improved tool stability old code traps closed
Byte minimap Allows you to instantly scan the hex grid of a binary file, simplifying research and instantly identifying where packed code or similar may be located.
Core Features
- Memory-Mapped File engine scales to arbitrarily large binaries with zero heap pressure.
- WriteableBitmap renderer bypasses the WPF render pipeline entirely; pixel-perfect output at native DPI.
- GlyphCache subsystem rasterizes each character once and blits it via direct memory copy thereafter.
- Dirty Tracking system features lock-free snapshot reads for zero-latency change visualization.
- Transactional Undo system — both step-by-step (Ctrl+Z) and full-session rollback (Ctrl+Shift+Z).
- Structured PE decomposition a layer that turns raw bytes into a navigable semantic tree.
- Built-in x86 assembler compiles instructions to opcodes inline with automatic relative offset resolution.
- Scriptable patching DSL (.euv) custom language with live file-watch execution for automated tasks.
- Plugin-extensible detector pipeline modular system for automated packer/protector identification.
- Fully themeable rendering layer persistent theme state across sessions with deep UI customization.
EUVA: Initial Research Build
Release Notes (v0.1.0-alpha)
Core Engine
High-Performance I/O: Implemented memory-mapped file access for near-instant handling of large binaries.
PE Static Analysis: Initial support for parsing Portable Executable structures.
Scripting Engine: Integrated a stable scripting environment for automated analysis and custom logic.
Interface
WPF-driven UI: Built with a focus on low-latency data rendering.
Modern Aesthetics: Clean, zero-bloat environment for focused research.
This is a pre-production build. Refer to the Disclaimer in the README for terms of use.