Difference between revisions of "Reverse Engineering Resources"
From Tmplab
(2 intermediate revisions by the same user not shown) | |||
Line 6: | Line 6: | ||
== Carving == | == Carving == | ||
* Python hachoir | * Python hachoir | ||
+ | |||
+ | == ELF debugger == | ||
+ | * gdb | ||
+ | * http://code.google.com/p/xdbg/ | ||
== Java == | == Java == | ||
* JD | * JD | ||
* JAD | * JAD | ||
− | * Baksmali ( | + | |
+ | === Android Java (Davlik) === | ||
+ | * Baksmali | ||
+ | * Dedexer | ||
+ | * Dexdump (from within emulated phone, with SDK) | ||
== Flash == | == Flash == |
Latest revision as of 17:29, 14 August 2010
Contents
Binary
Dumper
- xxd
Carving
- Python hachoir
ELF debugger
Java
- JD
- JAD
Android Java (Davlik)
- Baksmali
- Dedexer
- Dexdump (from within emulated phone, with SDK)
Flash
- SWFdecompiler
- SWFscan
- SWdec
- flasm
- flare
DotNet
- Reflector
Text
- geany (linux)
- textmate (macosx)
Debugger / Disasm
- IDA
- OllyDbg
- Immunity Debugger
Telecom
SMS
- PDUspy (win)