Exploit Development and Reverse Engineering with GDB Made Easy
-
Updated
Jun 30, 2024 - Python
Exploit Development and Reverse Engineering with GDB Made Easy
A suite of tools for creating disassemblies of ZX Spectrum games.
WIP tool for disassembling and (re)assembling ASL binaries for Croc 1
Disassembler Abstraction API
Python cross-version bytecode library and disassembler
Reverse engineering tool for linux games
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
Project template for decomp-toolkit
Reverse Engineering Framework for the Polyend Tracker
A pure-Python Java bytecode manipulation library.
Reverse engineering framework in Python
RetroWrite -- Retrofitting compiler passes through binary rewriting
SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.
Python Command-Line Ghidra Decompiler
Android Dex disassembler and Binary Ninja plugin
Disassemble RISC OS code from Python
RetroAsm: Assembly Toolkit
Extension for GDB
Add a description, image, and links to the disassembler topic page so that developers can more easily learn about it.
To associate your repository with the disassembler topic, visit your repo's landing page and select "manage topics."