Ghidra](https://ghidra-sre.org/ 7) - a software reverse engineering (SRE) suite of tools developed by NSA’s Research Directorate
Interactive Disassembler (IDA Pro) 3 - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, IDA Free 1.
WDK/WinDbg 2 - Windows Driver Kit and WinDbg.
OllyDbg 1 - x86 debugger for Windows binaries that emphasizes binary code analysis.
Radare2 2 - Open source, crossplatform reverse engineering framework.
x64dbg 1 - Open source x64/x32 debugger for windows.
Immunity Debugger 1 - Powerful way to write exploits and analyze malware.
Evan’s Debugger 1 - OllyDbg-like debugger for GNU/Linux.
Medusa 5 - Open source, cross-platform interactive disassembler.
plasma 3 - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
peda 1 - Python Exploit Development Assistance for GDB.
dnSpy 2 - Tool to reverse engineer .NET assemblies.
binwalk 1 - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
PyREBox 1 - Python scriptable Reverse Engineering sandbox by Cisco-Talos.
Voltron 2 - Extensible debugger UI toolkit written in Python.
Capstone 1 - Lightweight multi-platform, multi-architecture disassembly framework.
rVMI 1 - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.
Frida 1 - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
