Friday, August 7, 2020

Reverse Engineering Tools | Big List!

 Ghidra](https://ghidra-sre.org/ 7) - a software reverse engineering (SRE) suite of tools developed by NSA’s Research Directorate

  • Interactive Disassembler (IDA Pro) 3 - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, IDA Free 1.

  • WDK/WinDbg 2 - Windows Driver Kit and WinDbg.

  • OllyDbg 1 - x86 debugger for Windows binaries that emphasizes binary code analysis.

  • Radare2 2 - Open source, crossplatform reverse engineering framework.

  • x64dbg 1 - Open source x64/x32 debugger for windows.

  • Immunity Debugger 1 - Powerful way to write exploits and analyze malware.

  • Evan’s Debugger 1 - OllyDbg-like debugger for GNU/Linux.

  • Medusa 5 - Open source, cross-platform interactive disassembler.

  • plasma 3 - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.

  • peda 1 - Python Exploit Development Assistance for GDB.

  • dnSpy 2 - Tool to reverse engineer .NET assemblies.

  • binwalk 1 - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.

  • PyREBox 1 - Python scriptable Reverse Engineering sandbox by Cisco-Talos.

  • Voltron 2 - Extensible debugger UI toolkit written in Python.

  • Capstone 1 - Lightweight multi-platform, multi-architecture disassembly framework.

  • rVMI 1 - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.

  • Frida 1 - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.

Disqus Comments