Reversing
Tools used for solving Reversing challenges.
This is a curated list of reversing tools :
- Androguard — Androguard is a full python tool to play with Android files.
- Angr — A powerful and user-friendly binary analysis platform.
- Apk2gold — CLI tool for decompiling Android apps to Java.
- ApkTool — A tool for reverse engineering 3rd party, closed, binary Android apps.
- Binary Ninja — Binary Analysis Framework.
- BinUtils — Collection of binary tools.
- CTF_import — Run basic functions from stripped binaries cross platform.
- Compiler Explorer — Online compiler tool.
- CWE_checker — Finds vulnerable patterns in binary executables.
- Demovfuscator — A work-in-progress deobfuscator for movfuscated binaries.
- Disassembler.io — Disassemble On Demand. A lightweight, online service for when you don’t have the time, resources, or requirements to use a heavier-weight alternative.
- dnSpy — .NET debugger and assembly editor.
- EasyPythonDecompiler — A small .exe GUI application that will "decompile" Python bytecode, often seen in .pyc extension.
- Frida — Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
- GDB — The GNU Project debugger.
- GEF — A modern experience for GDB with advanced debugging features for exploit developers & reverse engineers.
- Ghidra — A software reverse engineering (SRE) suite of tools developed by NSA.
- Hopper — Reverse engineering tool (disassembler) for OSX and Linux.
- IDA Pro — Most used Reversing software.
- Jadx — Command line and GUI tools for producing Java source code from Android Dex and Apk files.
- Java Decompilers — An online decompiler for Java and Android APKs.
- JSDetox — A JavaScript malware analysis tool.
- miasm — Reverse engineering framework in Python.
- Objection — Runtime mobile exploration.
- Online Assembler/Disassembler — Online wrappers around the Keystone and Capstone projects.
- PEDA — Python Exploit Development Assistance for GDB.
- PEfile — Python module to read and work with PE (Portable Executable) files.
- Pwndbg — Exploit Development and Reverse Engineering with GDB Made Easy.
- radare2 — UNIX-like reverse engineering framework and command-line toolset.
- Rizin — Rizin is a fork of the radare2 reverse engineering framework with a focus on usability, working features and code cleanliness.
- Uncompyle — A Python 2.7 byte-code decompiler (.pyc)
- WinDBG — Windows debugger distributed by Microsoft.
- Z3 — A theorem prover from Microsoft Research.
