Ghidra is a software reverse engineering (SRE) framework
-
Updated
Nov 21, 2024 - Java
Ghidra is a software reverse engineering (SRE) framework
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
UNIX-like reverse engineering framework and command-line toolset
Program for determining types of files for Windows, Linux and MacOS.
Exploit Development and Reverse Engineering with GDB Made Easy
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.
Reverse engineering framework in Python
C++ python bytecode disassembler and decompiler
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
DIE engine
Reko is a binary decompiler.
Reverse engineering tool for linux games
Binary Analysis Platform
ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja disassemblers.
The OpenSource Disassembler
A libre cross-platform disassembler.
Powerful Disassembler Library For x86/AMD64
Add a description, image, and links to the disassembler topic page so that developers can more easily learn about it.
To associate your repository with the disassembler topic, visit your repo's landing page and select "manage topics."