Tag: tools

247 Is there any disassembler to rival IDA Pro? 2013-04-17T00:59:59.900

76 How to handle stripped binaries with GDB? No source, no symbols and GDB only shows addresses? 2013-04-27T03:13:34.493

46 how can I diff two x86 binaries at assembly code level? 2013-04-21T13:57:12.093

41 What is a good Java decompiler and deobfuscator? 2013-03-29T15:44:07.180

30 Open source GUI tool for decomposing a PDF 2013-04-03T03:09:07.193

25 Why are special tools required to ascertain the differences between two related binary code files? 2013-04-22T21:30:23.277

24 Tools to work cooperatively on the same binary 2013-03-28T09:39:52.443

22 What are the tools to analyze Python (obfuscated) bytecode? 2013-05-03T17:06:20.423

21 How do I acquire SoftICE? 2013-04-01T17:53:15.223

19 Determine Encryption Algorithm 2013-03-31T03:12:12.127

19 Decompiling .pyc files 2013-04-10T14:02:31.443

18 What tools exist for excavating data structures from flat binary files? 2014-01-20T04:45:41.053

16 Are there ready-to-go reverse engineering VMs? 2013-03-26T14:58:08.897

16 Automated tools for file format reverse engineering? 2013-03-27T17:17:58.523

16 Are there any tools or scripts for identifying compression algorithms in executables? 2013-04-01T22:49:19.713

16 Determining if a file is managed code or not 2013-04-05T17:54:15.087

16 USB Dongle Traffic Monitoring 2013-04-15T18:29:01.353

15 What are the essential IDA Plugins or IDA Python scripts that you use? 2013-03-20T12:57:53.483

14 Are there any open source test suites for testing how well a disassembler performs? 2013-03-20T15:56:57.997

14 How to see what data is being transmitted when an application calls home? 2013-04-06T13:45:41.450

13 How do you store your data about a binary while performing analysis? 2013-04-27T09:29:13.530

13 Any way to represent the file-memory relation in a Portable Executable (PE) file? 2013-04-28T16:30:31.063

13 Is there an actively maintained collaboration plugin for IDA? 2016-02-16T19:28:59.420

12 How does BinDiff work? 2013-04-02T09:35:57.497

12 What are the best practice methods for documenting research into the reverse engineering of a file format? 2013-04-05T00:21:52.173

12 How to decompile Linux .so library files from a MS-Windows OS? 2013-08-21T08:12:37.187

12 Should I switch from WinDbg to OllyDbg? 2014-01-09T23:20:54.887

12 Best alternatives to IDA Pro, Immunity and OllyDbg for a blind user 2016-02-12T17:55:31.500

11 How do I determine code coverage when fuzzing 2013-03-30T19:58:10.487

10 What are the main features of radare2? 2013-04-18T09:34:49.823

10 How to display memory zones content on IDA Pro? 2013-04-23T07:21:57.103

10 Where can I find tools for reverse engineering Lua 2013-05-16T16:17:12.610

10 Re-run autoanalysis in Hopper? 2013-05-17T18:46:34.323

10 What is the meaning of single letters in IDA's functions window? 2018-06-04T20:34:54.753

9 Context-Free Grammar from Samples 2013-03-31T00:13:12.507

9 Draw circuit of a multilayer PCB 2013-04-01T13:14:19.190

9 What are the differences between BitBlaze and BAP? 2013-04-08T12:03:57.463

9 Fixing the checksum of a modified Android ELF 2013-04-10T17:38:55.013

9 How can I prevent Immunity Debugger / OllyDbg from breaking on attach? 2013-04-12T09:40:39.973

9 What are the available libraries to statically modify ELF executables? 2013-04-18T09:43:07.177

9 Moving from Windows to Linux for Malware analysis. What should I consider? 2013-10-01T16:42:44.717

9 Rename obfuscated names with .NET Reflector? 2013-11-29T01:56:49.630

8 How can I use DynamoRIO or something similar in Linux kernel space? 2013-04-11T18:05:07.347

8 What are the techniques and tools to obfuscate Python programs? 2013-04-27T20:06:56.917

8 Freely available resource hacking applications 2013-06-25T08:20:30.947

8 Where can I get reliable tools for RE? 2013-07-07T20:39:05.067

8 Decompilation techniques for DOS .COM files 2014-03-04T22:27:24.993

7 Are there any ARM disassemblers that provide structured output? 2013-04-15T22:04:52.597

7 Working with DOS .COM files 2013-04-18T20:07:52.410

7 How can one extract resources from a New Executable? 2013-05-03T20:49:37.897

7 Trace assisted code identification? 2013-08-01T17:41:25.393

7 GDB issues: Can't set breakpoint on Obj-C method 2013-11-26T15:15:01.170

7 Re-engineering to create UML Diagrams from Source and Binary 2014-03-06T13:20:10.840

6 Which format/tool to store 'basic' informations? 2013-03-28T10:05:06.293

6 Available tools & techniques for locating sections of interest in a binary executable 2013-03-31T00:31:26.880

6 Are there any free or low cost disassemblers for the Renesas H8 family of processors? 2013-04-09T21:28:14.397

6 Debugging NewExecutable binaries 2013-04-22T09:49:45.830

6 What is difference between Digital Forensic and Reverse Engineering 2013-08-17T14:15:30.363

6 Which instrument is effective in discovering carrier frequency? 2013-10-30T12:14:10.647

6 How to get IDA Pro Free to automatically change segment on retf? 2014-01-26T21:42:17.227

6 What is the info displayed by radare2's afl? 2018-06-26T07:45:47.083

5 Secure RE-ing a PHP script 2013-03-27T08:23:11.430

5 Is BinNavi available? If not, can I get the source from anywhere? 2013-05-19T18:45:53.677

5 Are there any free disassemblers for the NEC 78K0R family of processors? 2013-06-27T06:33:15.577

5 Tool for checking for in-memory code modifications of loaded DLLs 2013-06-27T15:16:48.137

5 AndroGuard equivalent for iOS 2013-09-07T20:34:50.727

5 How to create a IDA FLIRT signature for a PPC library? 2015-05-15T12:42:30.973

4 How to produce binaries with "instruction camouflage" obfuscation? 2013-04-09T08:41:45.237

4 How accurate is Cerberus for reverse engineering malware? 2013-04-12T16:40:19.183

4 Why does an executable give an error when opened in $tool? 2013-04-18T18:26:48.757

4 Find file signatures inside an unknown file 2013-06-01T14:33:48.113

4 Tool for checking if there is any patch in the loaded module 2013-06-17T08:23:13.860

4 windbg crashdump process by pid from kernel 2013-06-26T10:24:13.453

4 How is Hopper on Windows or Linux? 2013-06-28T23:19:52.047

4 Corpus Distillation 2014-06-08T20:49:34.820

4 Is there a tool for proxying a dll that doesn't require IDA Pro? 2016-11-03T16:26:40.667

4 Tools for RE OpenCL Kernel 2016-11-13T01:00:32.063

4 How to label local variables in x64dbg 2017-10-25T21:55:04.613

3 How to quickly/easily make an analysis (reverse engineering) of the code of unknown CMS or framework on PHP? 2013-07-24T09:36:16.170

3 Documenting reversed application 2013-11-21T13:39:24.443

3 64 bit Pseudocode decompiler 2014-02-01T19:52:07.403

3 IDA Xrefs from - how to? 2014-05-05T20:20:21.223

3 What is a FAT header? 2014-10-01T15:20:57.683

3 Check if binary was compiled with security checks (/GS) 2014-11-24T18:14:42.857

3 Where to find a full analysis of the encryption scheme of CTB-Locker? 2015-02-11T13:57:53.307

3 Unable to dump a process 2015-07-14T10:03:12.503

3 When to use OllyDgb over Immunity Debugger 2015-11-09T01:43:28.523

3 Using multilevel pointers obtained via cheat engine in own application 2015-11-27T19:35:26.647

3 Getting pydbg working on windows 10 2016-10-19T04:15:18.383

3 Trying to decompress a hello world program using OllyDbg v201 2016-11-12T20:08:47.760

3 Finding a particular call to an offset within a vtable using pattern matching 2018-07-01T05:51:22.450

3 Hybrid binary analysis tool 2018-07-31T19:20:21.830

2 MITRE MAEC (Malware Attribute Enumeration and Characterization) opinions and usage 2013-05-10T07:21:23.123

2 Tools for annotating/describing disassembly 2013-06-29T08:51:48.163

2 Attack on wireless interconnection 2013-10-26T16:24:56.680

2 funcap not capturing information in IDA debugger 2014-01-03T22:55:03.360

2 Alternative to CaptureBAT on Windows 7? 2014-05-08T12:43:39.510

2 Find the instruction matching an opcode 2014-06-04T13:34:07.957

2 How to identify HTML5 geolocation protocol of a browser? 2014-07-31T18:45:55.150