Skip to content

Latest commit

 

History

History
76 lines (74 loc) · 7.28 KB

tools.md

File metadata and controls

76 lines (74 loc) · 7.28 KB

Not The Hidden Wiki

Learn Reverse Engineering


  1. Ghidra - link
  2. IDA Pro - link
  3. dnSpy - link
  4. radare2 - link
  5. x64dbg - link
  6. flareVM - link
  7. hexedit - link
  8. pe-bear - link
  9. Process Hacker - link
  10. Free and Open Source RE Platform - link
  11. pefile is a Python module to read and work with PE (Portable Executable) files - link
  12. FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware. - link
  13. PyInstaller Extractor - link
  14. apk.sh makes reverse engineering Android apps easier - link
  15. A tool for reverse engineering Android apk files - link
  16. Quickly analyze and reverse engineer Android packages - link
  17. javascript-obfuscator cleaner & deobfuscator - link
  18. C++ python bytecode disassembler and decompiler - link
  19. Avalonia-based .NET Decompiler (port of ILSpy) - link
  20. A Hex Editor for Reverse Engineers - link
  21. A helper script for unpacking and decompiling EXEs compiled from python code - link
  22. A True Instrumentable Binary Emulation Framework - link
  23. Awesome Malware Analysis: A curated list of awesome malware analysis tools and resources. - link
  24. Limon - Sandbox for Analyzing Linux Malwares - link
  25. A Dynamic Binary Instrumentation framework based on LLVM - link
  26. Vba2Graph: Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents. - link
  27. Aleph: OpenSource /Malware Analysis Pipeline System - link
  28. Aleph: File Analysis Pipeline - link
  29. A collection of x64dbg scripts - link
  30. DRAKVUF Sandbox - link
  31. Freki: Malware analysis platform - link
  32. Qu1cksc0pe: All-in-One malware analysis tool. - link
  33. ghidra-firmware-utils: Ghidra utilities for analyzing firmware - link
  34. dragondance: Binary code coverage visualizer plugin for Ghidra - link
  35. Ghidraaas: Ghidra as a Service - link
  36. SVD-Loader for Ghidra: Simplifying bare-metal ARM reverse engineering. link
  37. GhidraX64Dbg: Extract annoations from Ghidra into an X32/X64 dbg database. - link
  38. AngryGhidra: Use angr in Ghidra - link
  39. ghidra-scripts: A collection of my Ghidra scripts. - link
  40. Ghidrathon: The FLARE team's open-source extension - link
  41. NoVmp: A static devirtualizer for VMProtect x64 3.x powered by VTIL. - link
  42. Awesome IDA, x64DBG & OllyDBG plugins: A curated list of IDA x64DBG and OllyDBG plugins. - link
  43. edb - link
  44. Interactive Delphi Reconstructor IDR: a decompiler of executable files (EXE) and dynamic libraries (DLL), written in Delphi and executed in Windows32 environment. - link
  45. Reverse Engineer's Toolkit - link
  46. REDasm: Crossplatform, interactive, multiarchitecture disassembler - link
  47. Xori: Custom disassembly framework - link
  48. rattle: Rattle is an EVM binary static analysis framework designed to work on deployed smart contracts. - link
  49. starshipraider: High performance embedded systems debug/reverse engineering platform - link
  50. binja-ipython: A plugin to integrate an IPython kernel into Binary Ninja. - link
  51. PySameSame: This is a python version of samesame repo to generate homograph strings - link
  52. bearparser - link
  53. batch_deobfuscator: Deobfuscate batch scripts obfuscated using string substitution and escape character techniques. - link
  54. Stadeo: Control-flow-flattening and string deobfuscator - link
  55. msynth: Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions. - link
  56. The HT Editor: A file editor/viewer/analyzer for executables. - link
  57. panda: Platform for Architecture-Neutral Dynamic Analysis. - link
  58. miasm: Reverse engineering framework in Python - link
  59. rehex: Reverse Engineers' Hex Editor - link
  60. Awesome Reversing - link
  61. The Z3 Theorem Prover - link
  62. Pin is a dynamic binary instrumentation framework for the IA-32 and x86-64 - link
  63. ytisf/theZoo | A repository of LIVE malwares for your own joy and pleasure. - link
  64. Collection of malware source code for a variety of platforms in an array of different programming languages. - link
  65. Zeltser | Free Malware Sample Sources for Researchers - link
  66. Sixo Online APK Analyzer - link
  67. DLL Converter to position independent shellcode - link
  68. Decoders for some malware samples - link
  69. binary file to hex format converter - link
  70. Finding RWX section in PE file - link
  71. text to Little endian converter - link