Ghidra](https://ghidra-sre.org/) - a software reverse engineering (SRE) suite of tools developed by NSA’s Research Directorate
-
Interactive Disassembler (IDA Pro) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, IDA Free.
-
WDK/WinDbg - Windows Driver Kit and WinDbg.
-
OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
-
Radare2 - Open source, crossplatform reverse engineering framework.
-
x64dbg - Open source x64/x32 debugger for windows.
-
Immunity Debugger - Powerful way to write exploits and analyze malware.
-
Evan’s Debugger - OllyDbg-like debugger for GNU/Linux.
-
Medusa - Open source, cross-platform interactive disassembler.
-
plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
-
peda - Python Exploit Development Assistance for GDB.
-
dnSpy - Tool to reverse engineer .NET assemblies.
-
binwalk - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
-
PyREBox - Python scriptable Reverse Engineering sandbox by Cisco-Talos.
-
Voltron - Extensible debugger UI toolkit written in Python.
-
Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
-
rVMI - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.
-
Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.