Reverse Engineering: Difference between revisions
Jump to navigation
Jump to search
m (→Objdump) |
mNo edit summary |
||
Line 2: | Line 2: | ||
== Tools == | == Tools == | ||
=== IDA pro disassembler and debugger === | === IDA pro disassembler and debugger === | ||
(64-bit analysis is possible only with IDA Professional Edition) | |||
=== Objdump === | === Objdump === | ||
<code>objdump -b binary -D -m i386:x86-64 file</code> | |||
=== Udis86 === | === Udis86 === | ||
http://udis86.sourceforge.net/ | http://udis86.sourceforge.net/ | ||
=== c4decompiler === | |||
http://www.c4decompiler.com/ | |||
=== ollydbg 64 === | |||
http://www.ollydbg.de/odbg64.html | |||
=== HxD === | === HxD === | ||
http://mh-nexus.de/en/hxd/ | |||
{{Reverse Engineering}} | {{Reverse Engineering}} | ||
<noinclude>[[Category:Main]]</noinclude> | <noinclude>[[Category:Main]]</noinclude> |
Revision as of 17:53, 25 December 2013
Reverse Engineering? but we can bruteforce! not
Tools
IDA pro disassembler and debugger
(64-bit analysis is possible only with IDA Professional Edition)
Objdump
objdump -b binary -D -m i386:x86-64 file
Udis86
http://udis86.sourceforge.net/
c4decompiler
ollydbg 64
http://www.ollydbg.de/odbg64.html
HxD
|