Reverse Engineering Resources

From Tmplab

(Difference between revisions)
Jump to: navigation, search
(New page: !Binary: !!Dumper * xxd !!Carving * Python hachoir !Text: * geany (linux) * textmate (macosx))
Current revision (16:29, 14 August 2010) (edit) (undo)
 
(5 intermediate revisions not shown.)
Line 1: Line 1:
-
!Binary:
+
= Binary =
-
!!Dumper
+
== Dumper ==
* xxd
* xxd
-
!!Carving
+
== Carving ==
* Python hachoir
* Python hachoir
 +
== ELF debugger ==
 +
* gdb
 +
* http://code.google.com/p/xdbg/
-
!Text:
+
== Java ==
 +
* JD
 +
* JAD
 +
 
 +
=== Android Java (Davlik) ===
 +
* Baksmali
 +
* Dedexer
 +
* Dexdump (from within emulated phone, with SDK)
 +
 
 +
== Flash ==
 +
* SWFdecompiler
 +
* SWFscan
 +
* SWdec
 +
* flasm
 +
* flare
 +
 
 +
== DotNet ==
 +
* Reflector
 +
 
 +
= Text =
* geany (linux)
* geany (linux)
* textmate (macosx)
* textmate (macosx)
 +
 +
= Debugger / Disasm =
 +
* IDA
 +
* OllyDbg
 +
* Immunity Debugger
 +
 +
= Telecom =
 +
 +
== SMS ==
 +
* PDUspy (win)

Current revision

Contents

Binary

Dumper

  • xxd

Carving

  • Python hachoir

ELF debugger

Java

  • JD
  • JAD

Android Java (Davlik)

  • Baksmali
  • Dedexer
  • Dexdump (from within emulated phone, with SDK)

Flash

  • SWFdecompiler
  • SWFscan
  • SWdec
  • flasm
  • flare

DotNet

  • Reflector

Text

  • geany (linux)
  • textmate (macosx)

Debugger / Disasm

  • IDA
  • OllyDbg
  • Immunity Debugger

Telecom

SMS

  • PDUspy (win)
Personal tools