Difference between revisions of "Reverse Engineering Resources"
From Tmplab
| (4 intermediate revisions by the same user not shown) | |||
| Line 7: | Line 7: | ||
* Python hachoir | * Python hachoir | ||
| + | == ELF debugger == | ||
| + | * gdb | ||
| + | * http://code.google.com/p/xdbg/ | ||
| + | |||
| + | == Java == | ||
| + | * JD | ||
| + | * JAD | ||
| + | |||
| + | === Android Java (Davlik) === | ||
| + | * Baksmali | ||
| + | * Dedexer | ||
| + | * Dexdump (from within emulated phone, with SDK) | ||
| + | |||
| + | == Flash == | ||
| + | * SWFdecompiler | ||
| + | * SWFscan | ||
| + | * SWdec | ||
| + | * flasm | ||
| + | * flare | ||
| + | |||
| + | == DotNet == | ||
| + | * Reflector | ||
= Text = | = Text = | ||
| Line 16: | Line 38: | ||
* OllyDbg | * OllyDbg | ||
* Immunity Debugger | * Immunity Debugger | ||
| + | |||
| + | = Telecom = | ||
| + | |||
| + | == SMS == | ||
| + | * PDUspy (win) | ||
Latest revision as of 17:29, 14 August 2010
Contents
Binary
Dumper
- xxd
Carving
- Python hachoir
ELF debugger
Java
- JD
- JAD
Android Java (Davlik)
- Baksmali
- Dedexer
- Dexdump (from within emulated phone, with SDK)
Flash
- SWFdecompiler
- SWFscan
- SWdec
- flasm
- flare
DotNet
- Reflector
Text
- geany (linux)
- textmate (macosx)
Debugger / Disasm
- IDA
- OllyDbg
- Immunity Debugger
Telecom
SMS
- PDUspy (win)
