====== Reverse Engineering ====== Also called *reversing*. ===== tools / arsenal ===== (Maybe some of them are FOSS, didn't check all) * [[https://binary.ninja/|Binary Ninja]] – modern UX disassembler and code analysis platform * IDA Pro * CFF Explorer * Winhex * API Monitor * Fiddler – MITM proxy * Scylla * PEiD * binvis.io ==== Open Source ==== * [[https://ghidra-sre.org/|Ghidra]] – software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission * radare2 * Cutter iaito – GUI for radare2 * has plugins for [[https://github.com/radareorg/radare2/blob/master/doc/yara.md|YARA]], [[https://github.com/radareorg/radare2/blob/master/doc/flirt.md|FLIRT]] * [[https://rizin.re/|Rizin]] – fork of radare2 with the Cutter GUI * [[https://github.com/ReFirmLabs/binwalk|binwalk]] – Firmware analysis * has plugins * mitmproxy * strings * hexdump * wxHexEditor ===== links ===== * [[https://github.com/alphaSeclab/awesome-reverse-engineering/blob/master/Readme_full_en.md|awesome-reverse-engineering]] list on github