Documentation Index
Fetch the complete documentation index at: https://docs.kong.fyi/llms.txt
Use this file to discover all available pages before exploring further.

The Problem: Stripped Binaries
When developers compile source code into a binary, the compiler throws away almost everything that made the code readable. In the original source, a function might be calledparse_http_header. It has descriptive parameter names like request and buffer_size. The structs have meaningful field names. There are comments explaining edge cases.
After stripping, that same function becomes FUN_00401a30. Its parameters are param_1 and param_2. The structs are flattened into raw pointer offsets. Every function in the binary looks like this — hundreds or thousands of them, with no indication of what any of them do.
Recovering that context is the bulk of the work in most reverse engineering tasks. And it is tedious. An experienced analyst might spend hours renaming functions, tracing data flow, and mentally reconstructing types. For a binary with a few hundred functions, that work can stretch into days.
How Kong Solves It
Kong combines Ghidra (the NSA’s reverse engineering framework) with large language models (Claude and GPT-4o) to automate symbol recovery. A single command runs the full pipeline:- Triage — enumerate every function, classify by complexity, build the call graph, and match known library signatures
- Analysis — process functions bottom-up from the call graph, building rich context windows from Ghidra’s program database before sending each function to the LLM
- Cleanup — normalize and deduplicate results
- Synthesis — unify naming conventions across the entire binary and synthesize struct definitions
- Export — write everything back to Ghidra and produce
analysis.json
The Results
When Kong analyzed the XZ Utils backdoor — a real-world supply chain attack that made international news — it recovered function names, types, and structures from the fully stripped malicious binary in about 15 minutes for roughly $6.63 in API costs. That same analysis would take an experienced reverse engineer days of manual work. Kong transformsFUN_00401a30 into parse_http_header, recovers struct layouts, identifies cryptographic routines by signature, and writes everything back into Ghidra’s program database so you can continue your analysis with real names instead of auto-generated labels.

