UNIX-like reverse engineering framework and command-line toolset
-
Updated
Jul 16, 2024 - C
UNIX-like reverse engineering framework and command-line toolset
An x86/x64 instruction disassembler written in C
bddisasm is a fast, lightweight, x86/x64 instruction decoder. The project also features a fast, basic, x86/x64 instruction emulator, designed specifically to detect shellcode-like behavior.
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.
Advanced Game Hacking Library for C, Modern C++, Rust and Python (Windows/Linux/FreeBSD) (Process/Memory Hacking) (Hooking/Detouring) (Cross Platform) (x86/x64/ARM/ARM64) (DLL/SO Injection) (Internal/External) (Assembler/Disassembler)
Modernised version of W. de Waal's public domain 68000 disassembler.
InfoSec Binary Hex Editor with Retro Disassemblers
Simple decompiler for Rizin
Disassembler and other tools for files in ITS formats
ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja disassemblers.
Disassembler for Windows executables. Supports 16-bit NE (New Executable), MZ (DOS), and PE (Portable Executable, i.e. Win32) files.
A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.
Add a description, image, and links to the disassembler topic page so that developers can more easily learn about it.
To associate your repository with the disassembler topic, visit your repo's landing page and select "manage topics."