Reverse Engineering Tools | Big List!

Ghidra](https://ghidra-sre.org/) - a software reverse engineering (SRE) suite of tools developed by NSA’s Research Directorate

  • Interactive Disassembler (IDA Pro) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, IDA Free.

  • WDK/WinDbg - Windows Driver Kit and WinDbg.

  • OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.

  • Radare2 - Open source, crossplatform reverse engineering framework.

  • x64dbg - Open source x64/x32 debugger for windows.

  • Immunity Debugger - Powerful way to write exploits and analyze malware.

  • Evan’s Debugger - OllyDbg-like debugger for GNU/Linux.

  • Medusa - Open source, cross-platform interactive disassembler.

  • plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.

  • peda - Python Exploit Development Assistance for GDB.

  • dnSpy - Tool to reverse engineer .NET assemblies.

  • binwalk - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.

  • PyREBox - Python scriptable Reverse Engineering sandbox by Cisco-Talos.

  • Voltron - Extensible debugger UI toolkit written in Python.

  • Capstone - Lightweight multi-platform, multi-architecture disassembly framework.

  • rVMI - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.

  • Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.

16 Likes

Can explain you explain how to use this tools or tools tutorials