EN
ENNA

dnSpy vs Unicorn Engine

GitHub Stats

29.2k
Stars
8.9k
5.5k
Forks
1.5k
185
Issues
170
5y ago
Updated
1mo ago
-
License
GPL-2.0
C#
Language
C

About dnSpy

dnSpy is a debugger and .NET assembly editor that allows you to decompile, modify, and debug .NET assemblies even without source code. It includes a full-featured debugger that can debug .NET Framework, .NET Core, and Unity game assemblies, with support for breakpoints, stepping, locals, watch windows, and the immediate window. The decompiler produces readable C# or Visual Basic code from compiled assemblies, and the built-in editor allows direct modification of IL code, metadata, and resources. dnSpy is an essential tool for malware analysts examining .NET malware, reverse engineers working with Unity games, and security researchers analyzing compiled .NET applications. While the original repository is archived, several actively maintained forks continue development.

About Unicorn Engine

Unicorn is a lightweight, multi-platform, multi-architecture CPU emulator framework based on QEMU. It provides a clean API for emulating machine code across x86 (16/32/64-bit), ARM, ARM64, MIPS, SPARC, and M68K architectures. Unlike full system emulators, Unicorn focuses purely on CPU instruction emulation - no OS, no hardware peripherals - which makes it fast and embeddable. Security researchers use Unicorn to emulate specific code snippets (like unpacking routines, decryption functions, or shellcode) without executing them on real hardware, making it invaluable for malware analysis, fuzzing, and binary instrumentation. Unicorn provides hooks for memory access, code execution, and interrupts, allowing fine-grained observation and control of emulated code. Bindings exist for Python, Java, Go, Rust, Ruby, and many other languages.

Platform Support

🪟windows
🐧linux🍎macos🪟windows

Tags

dnSpy only

dotnetdecompilerdebuggerassembly-editorunitymalware-analysis

Unicorn Engine only

emulatorcpuqemushellcodefuzzingmulti-arch