Changes

Jump to navigation Jump to search
2,736 bytes added ,  00:12, 8 October 2023
For now I guess ok. I still am not happy with the layout, needs improvement imho
<br />
==== Signals Analysis ====* [https://github.com/jopohl/urh Universal Radio Hacker] - tool to analyze and extract data from SDR-captured radio signals (especially pilots, ISM RF devices, etc). See youtube for tutorials and examples.
==== Binary reverse engineering ====* [https://binarywww.ninjagnuradio.org/ Binary NinjaGNU Radio] - reversetoolkit that provides signal processing blocks to implement software-engineering platform that can disassemble a binary defined radios and display the disassembly in linear or graph viewssignal processing systems.
====Debugger / disassembler for unmanged binaries====* [https://wwwbinary.nsa.govninja/resources/everyone/ghidra/ GhidraBinary Ninja] - Ghidra is an open source software reverse -engineering (SRE) framework developed by NSA's [https://www.nsa.gov/what-we-do/research/ Research] Directorate for NSA's [https://www.nsa.gov/what-we-do/cybersecurity/ cybersecurity mission]platform that can disassemble a binary and display the disassembly in linear or graph views.
* [https://www.hex-raysnsa.comgov/resources/productseveryone/idaghidra/ IDAGhidra] - The IDA Disassembler and Debugger Ghidra is an interactive, programmable, extensible, multiopen source software reverse engineering (SRE) framework developed by NSA's [https://www.nsa.gov/what-processor disassembler hosted on Windows, Linux, or Mac OS Xwe-do/research/ Research] Directorate for NSA's [https://www.nsa.gov/what-we-do/cybersecurity/ cybersecurity mission].
* [https://githubwww.hex-rays.com/vivisectproducts/ida/vivisect VivisectIDA] - Vivisect binary analysis framework. Includes The IDA Disassembler, and Debugger, Emulation and Symbolik analysis engines. Includes built-in Server and Shared-Workspace functionality. Runs is an interactive or headless, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X (Pure-Python, using ctypes to access underlying OS debug mechanism). Supports RevSync via plugin, allowing basic collaboration with Binja, Ghidra, and IDA. Criticisms (from a core dev): "Graph View could use some work, slower than Binja and IDA (due to Python), documentation like an OpenSource Project... but we keep working to make it better. PR's and suggestions welcome." Best installed via Pip: <code>python3 -m pip install vivisect</code>
* [https://github.com/vivisect/vivisect Vivisect] - Vivisect binary analysis framework. Includes Disassembler, Debugger, Emulation and Symbolik analysis engines. Includes built-in Server and Shared-Workspace functionality. Runs interactive or headless, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X (Pure-Python, using ctypes to access underlying OS debug mechanism). Supports RevSync via plugin, allowing basic collaboration with Binja, Ghidra, and IDA. Criticisms (from a core dev): "Graph View could use some work, slower than Binja and IDA (due to Python), documentation like an OpenSource Project... but we keep working to make it better. PR's and suggestions welcome." Best installed via Pip: <code>python3 -m pip install vivisect</code> * [https://codisec.com/veles/ Veles] - Open source tool for binary data analysis (No longer actively developed). * [https://www.immunityinc.com/products/debugger/ Immunity Debugger] - is a powerful new way to write exploits, analyze malware, and reverse engineer Windows binary files (python support) * [https://www.hopperapp.com/ Hopper] - Hopper can use LLDB or GDB, which lets you debug and analyze the binary in a dynamic way (only for Mac and Linux hosts, not for mobile devices). * [https://x64dbg.com/ x64dbg] - Is a powerful Open Source Ollydbg replacement with a User Interface very similar to Ollydbg also x64dbg as the name states offers x64 support. * [https://github.com/java-decompiler/jd-gui Reko] - Reko is a binary decompiler for static analysis (ARM, x86-64, M68K, Aarch65, RISC-V and dotnet) ==== Debugger / disassembler for manged binaries ==== ===== .NET =====* [https://github.com/dnSpy/dnSpy dnSpy] - is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available. * [https://github.com/icsharpcode/ILSpy ILSpy] - NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&more) - cross-platform! * [https://www.telerik.com/products/decompiler.aspx Telerik JustDecompile] - is a free .NET decompiler and assembly browser that makes high-quality .NET decompilation easy With an open source decompilation engine. ===== JAVA =====* [https://github.com/skylot/jadx Jadx] - Dex to Java decompiler. Command-line and GUI tools for producing Java source code from Android Dex and apk files. * [https://github.com/Col-E/Recaf Recaf] - Recaf is an open-source Java bytecode editor that simplifies the process of editing compiled Java applications. * [https://www.pnfsoftware.com/ JEB decompiler] - Decompile and debug Android dalvik, Intel x86, ARM, MIPS, RISC-V, S7 PLC, Java, WebAssembly & Ethereum Decompilers. ==== Tools for opening CAD or Boardview files ===='''Description''': Boardview is a type of file containing information about printed circuit boards, their components, used signals, test points and more. These files may have following extensions: .asc, .bdv, .brd, .bv, .cad, .cst, .gr, .f2b, .fz. .tvw and others. * [https://pldaniels.com/flexbv5/ FlexBV] - Advanced FlexBV boardview software integrates your boardview files with PDF schematics to substantially ease the process of tracking down faults and understanding damaged boards * [http://boardviewer.net/ BoardViewer] - BoardViewer is software intended for viewing various boardview file types * CADview - simple old tool for viewing CAD files of PCB's. [[File:CAD View.zip|thumb]]
<br />
==Education==

Navigation menu