Difference between revisions of "Reverse Engineering Resources"
From Tmplab
(3 intermediate revisions by the same user not shown) | |||
Line 7: | Line 7: | ||
* Python hachoir | * Python hachoir | ||
+ | == ELF debugger == | ||
+ | * gdb | ||
+ | * http://code.google.com/p/xdbg/ | ||
+ | |||
+ | == Java == | ||
+ | * JD | ||
+ | * JAD | ||
+ | |||
+ | === Android Java (Davlik) === | ||
+ | * Baksmali | ||
+ | * Dedexer | ||
+ | * Dexdump (from within emulated phone, with SDK) | ||
+ | |||
+ | == Flash == | ||
+ | * SWFdecompiler | ||
+ | * SWFscan | ||
+ | * SWdec | ||
+ | * flasm | ||
+ | * flare | ||
+ | |||
+ | == DotNet == | ||
+ | * Reflector | ||
= Text = | = Text = |
Latest revision as of 17:29, 14 August 2010
Contents
Binary
Dumper
- xxd
Carving
- Python hachoir
ELF debugger
Java
- JD
- JAD
Android Java (Davlik)
- Baksmali
- Dedexer
- Dexdump (from within emulated phone, with SDK)
Flash
- SWFdecompiler
- SWFscan
- SWdec
- flasm
- flare
DotNet
- Reflector
Text
- geany (linux)
- textmate (macosx)
Debugger / Disasm
- IDA
- OllyDbg
- Immunity Debugger
Telecom
SMS
- PDUspy (win)