Reverse Engineering
9 tools indexed
Binary analysis, disassembly, decompilation, and debugging tools for reverse engineering executables, malware, and firmware. These tools help security researchers understand how compiled software works, identify vulnerabilities, and analyze malicious code without access to source.
dnSpy
.NET debugger, decompiler, and assembly editor. Inspect and modify .NET and Unity assemblies without source code.
ILSpy
Open-source .NET decompiler and assembly browser. Produces clean C# from compiled binaries with cross-platform support.
x64dbg
Open-source x64/x32 debugger for Windows. Full-featured binary debugger with plugin ecosystem for malware analysis and reverse engineering.
Detect It Easy
Binary packer and compiler detection. Identifies compilers, linkers, packers, and protectors used to build PE, ELF, and Mach-O files.
angr
Binary analysis framework. Symbolic execution, CFG recovery, and vulnerability discovery for compiled binaries in Python.
RetDec
Retargetable decompiler by Avast. Converts machine code back to C from x86, ARM, MIPS, and PowerPC binaries.
Rizin
Reverse engineering framework forked from radare2. Modernized API, improved UX, with Cutter as its official GUI.
Unicorn Engine
Lightweight CPU emulator framework. Emulate x86, ARM, MIPS, and more for binary analysis, fuzzing, and instrumentation.
Capstone
Multi-architecture disassembly framework. The engine behind Ghidra, radare2, and dozens of security tools.