Difference between revisions of "Reverse Engineering Resources"

From Tmplab
 
(3 intermediate revisions by the same user not shown)
Line 7: Line 7:
 
* Python hachoir
 
* Python hachoir
  
 +
== ELF debugger ==
 +
* gdb
 +
* http://code.google.com/p/xdbg/
 +
 +
== Java ==
 +
* JD
 +
* JAD
 +
 +
=== Android Java (Davlik) ===
 +
* Baksmali
 +
* Dedexer
 +
* Dexdump (from within emulated phone, with SDK)
 +
 +
== Flash ==
 +
* SWFdecompiler
 +
* SWFscan
 +
* SWdec
 +
* flasm
 +
* flare
 +
 +
== DotNet ==
 +
* Reflector
  
 
= Text =
 
= Text =

Latest revision as of 17:29, 14 August 2010

Binary

Dumper

  • xxd

Carving

  • Python hachoir

ELF debugger

Java

  • JD
  • JAD

Android Java (Davlik)

  • Baksmali
  • Dedexer
  • Dexdump (from within emulated phone, with SDK)

Flash

  • SWFdecompiler
  • SWFscan
  • SWdec
  • flasm
  • flare

DotNet

  • Reflector

Text

  • geany (linux)
  • textmate (macosx)

Debugger / Disasm

  • IDA
  • OllyDbg
  • Immunity Debugger

Telecom

SMS

  • PDUspy (win)