Reverse Engineering Resources

From Tmplab

(Difference between revisions)
Jump to: navigation, search
Current revision (16:29, 14 August 2010) (edit) (undo)
 
(One intermediate revision not shown.)
Line 6: Line 6:
== Carving ==
== Carving ==
* Python hachoir
* Python hachoir
 +
 +
== ELF debugger ==
 +
* gdb
 +
* http://code.google.com/p/xdbg/
== Java ==
== Java ==
* JD
* JD
* JAD
* JAD
 +
=== Android Java (Davlik) ===
=== Android Java (Davlik) ===
* Baksmali
* Baksmali
* Dedexer
* Dedexer
 +
* Dexdump (from within emulated phone, with SDK)
== Flash ==
== Flash ==

Current revision

Contents

Binary

Dumper

  • xxd

Carving

  • Python hachoir

ELF debugger

Java

  • JD
  • JAD

Android Java (Davlik)

  • Baksmali
  • Dedexer
  • Dexdump (from within emulated phone, with SDK)

Flash

  • SWFdecompiler
  • SWFscan
  • SWdec
  • flasm
  • flare

DotNet

  • Reflector

Text

  • geany (linux)
  • textmate (macosx)

Debugger / Disasm

  • IDA
  • OllyDbg
  • Immunity Debugger

Telecom

SMS

  • PDUspy (win)
Personal tools