General
Statically Analyze Code
Last updated
Statically Analyze Code
Last updated
IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.
Website: Author: Google/Zynamics License: Apache License 2.0: Notes: binnavi State File:
Software reverse engineering tool suite
Website: Author: National Security Agency License: Apache License 2.0: Notes: Close CodeBrowser before exiting Ghidra to prevent Ghidra from freezing when you reopen the tool (it's a Ghidra bug). State File:
Reverse engineering platform powered by Rizin
Website:
Author:
License: GNU General Public License (GPL) v3.0:
Notes: If you're planning to use Cutter when running REMnux as a Docker container, you'll need to include the --privileged
parameter when invoking the REMnux distro image in Docker.
State File:
Determine types of files and examine file properties.
Website:
Author: hors:
License: MIT License:
Notes: GUI tool: die
, command-line tool: diec
.
State File:
Emulate code execution of PE files, shellcode, etc. for a variety of OS and hardware platforms.
Statically examine and emulate binary files.
Disassemble binary files.
Website:
Author:
License: GNU General Public License (GPL) v2.0:
Notes: Use qltool
to analyze artifacts. Before analyzing Windows artifacts, gather Windows DLLs and other components using the script. Read the tool's to get started.
State File:
Website: Author: invisigoth: invisigoth@kenshoto.com, installable vivisect module by Willi Ballenthin: License: Apache License 2.0: Notes: vivbin, vdbbin State File:
Website: Author: Unknown License: GNU General Public License (GPL) State File: