Exploit Development and Reverse Engineering with GDB Made Easy
-
Updated
Nov 16, 2024 - Python
Exploit Development and Reverse Engineering with GDB Made Easy
Reverse engineering framework in Python
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
Reverse engineering tool for linux games
RetroWrite -- Retrofitting compiler passes through binary rewriting
BeaEngine disasm project
Security Analysis tool for WebAssembly module (wasm) and Blockchain Smart Contracts (BTC/ETH/NEO/EOS)
Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
Unity IL2CPP Disassembler (for apk)
Python cross-version bytecode library and disassembler
Ghidra Analysis Enhancer 🐉
Game Boy ROM disassembler with RGBDS compatible output
Cairo/Starknet security toolkit (bytecode analyzer, disassembler, decompiler, symbolic execution, SBMC)
SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.
An ethereum evm bytecode disassembler and static/dynamic analysis tool
Add a description, image, and links to the disassembler topic page so that developers can more easily learn about it.
To associate your repository with the disassembler topic, visit your repo's landing page and select "manage topics."