Difference between revisions of "Reverse Engineering Resources"
From Tmplab
| (3 intermediate revisions by the same user not shown) | |||
| Line 7: | Line 7: | ||
* Python hachoir | * Python hachoir | ||
| + | == ELF debugger == | ||
| + | * gdb | ||
| + | * http://code.google.com/p/xdbg/ | ||
| + | |||
| + | == Java == | ||
| + | * JD | ||
| + | * JAD | ||
| + | |||
| + | === Android Java (Davlik) === | ||
| + | * Baksmali | ||
| + | * Dedexer | ||
| + | * Dexdump (from within emulated phone, with SDK) | ||
| + | |||
| + | == Flash == | ||
| + | * SWFdecompiler | ||
| + | * SWFscan | ||
| + | * SWdec | ||
| + | * flasm | ||
| + | * flare | ||
| + | |||
| + | == DotNet == | ||
| + | * Reflector | ||
= Text = | = Text = | ||
Latest revision as of 17:29, 14 August 2010
Contents
Binary
Dumper
- xxd
Carving
- Python hachoir
ELF debugger
Java
- JD
- JAD
Android Java (Davlik)
- Baksmali
- Dedexer
- Dexdump (from within emulated phone, with SDK)
Flash
- SWFdecompiler
- SWFscan
- SWdec
- flasm
- flare
DotNet
- Reflector
Text
- geany (linux)
- textmate (macosx)
Debugger / Disasm
- IDA
- OllyDbg
- Immunity Debugger
Telecom
SMS
- PDUspy (win)
