| android-apktool |
2.7.0 |
A tool for reverse engineering Android apk files. |
|
| apkstudio |
100.9e114ca |
An IDE for decompiling/editing & then recompiling of android application binaries. |
|
| binaryninja |
5.1.8104 |
A new kind of reversing platform (demo version). |
|
| ctypes-sh |
158.b79e401 |
Allows you to call routines in shared libraries from within bash. |
|
| elidecode |
48.38fa5ba |
A tool to decode obfuscated shellcodes using the unicorn-engine for the emulation and the capstone-engine to print the asm code. |
|
| flasm |
1.62 |
Disassembler tool for SWF bytecode |
|
| frida-extract |
13.abb3f14 |
Frida.re based RunPE (and MapViewOfSection) extraction tool. |
|
| ghidriff |
v1.0.0.r2.g53e16cf |
Python Command-Line Ghidra Binary Diffing Engine. |
|
| gostringsr2 |
1.1.2 |
Extract strings from a Go binary using radare2. |
|
| hopper |
5.19.4 |
Reverse engineering tool that lets you disassemble, decompile and debug your applications. |
|
| ida-free |
8.4.240527 |
Freeware version of the world's smartest and most feature-full disassembler. |
|
| innounp |
0.50 |
Inno Setup Unpacker. |
|
| javasnoop |
1.1 |
A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer |
|
| jeb-android |
3.7.0.201909272058 |
Android decompiler. |
|
| jeb-arm |
5.20.0.202411121942 |
Arm decompiler. |
|
| jeb-intel |
3.7.0.201909272058 |
Intel decompiler. |
|
| jeb-mips |
5.20.0.202411121942 |
Mips decompiler. |
|
| jeb-webasm |
3.7.0.201909272058 |
WebAssembly decompiler. |
|
| jwscan |
7.874b3a5 |
Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe. |
|
| libc-database |
45.69815cd |
Database of libc offsets to simplify exploitation. |
|
| malwasm |
0.2 |
Offline debugger for malware's reverse engineering. |
|
| mikrotik-npk |
11.d54e97c |
Python tools for manipulating Mikrotik NPK format. |
|
| netzob |
1.0.2 |
An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols. |
|
| pintool |
24.d538a79 |
This tool can be useful for solving some reversing challenges in CTFs events. |
|
| pintool2 |
5.1c1af91 |
Improved version of pintool. |
|
| pyinstxtractor |
2025.02.r2.g3b38d8d |
PyInstaller Extractor. |
|
| python-frida |
17.3.2 |
Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. |
|
| python2-frida |
15.2.2 |
Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. |
|
| radare2-keystone |
920.1cf5851 |
Keystone assembler plugins for radare2. |
|
| seccomp-tools |
1.6.1 |
Seccomp analysis toolkit. |
|
| swfintruder |
0.9.1 |
First tool for testing security in Flash movies. A runtime analyzer for SWF external movies. It helps to find flaws in Flash. |
|
| swftools |
0.9.2 |
A collection of SWF manipulation and creation utilities. |
|
| syms2elf |
12.329c2ce |
A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table. |
|
| udis86 |
1.7.2 |
A minimalistic disassembler library. |
|