Reverse Engineering
Reverse Engineering (RE)
Tools
| Tool | Description |
|---|---|
| Angr | Python framework for symbolic execution and binary analysis |
| Triton | Dynamic binary analysis and symbolic execution library |
| Qu1cksc0pe | All-in-one malware analysis and threat inspection tool |
Command line
| Tool | Description |
|---|---|
| ltrace | Traces library calls made by a program |
| strace | Monitors system calls and signals |
| ptrace | Linux syscall interface for debugging processes |
| file | Identifies file types from signatures and metadata |
| strings | Extracts printable text strings from binaries |
| readelf | Displays ELF binary structure and metadata |
| objdump | Disassembles and inspects binary object files |
Disassemblers
| Tool | Description |
|---|---|
| Ghidra | Open-source reverse engineering and decompiler suite |
| IDA | Interactive disassembler and reverse engineering tool |
| Binary Ninja | Reverse engineering platform with modern analysis UI |
| Radare2 | Command-line framework for binary analysis and exploitation |
Online
| Tool | Description |
|---|---|
| Compiler Explorer | Online compiler explorer with assembly output comparison |
| Decompiler Explorer | Online platform comparing multiple decompilers |
| CPUlator | Browser-based CPU and computer system simulator |
Nix - Flake environment
flake.nix
| |
Resources
Last updated on