Changes

Jump to navigation Jump to search
1,090 bytes added ,  15:56, 23 November 2020
[[File:Schematic Capture.png|thumb|Schematic of an embedded device]]
Disassemblers, Decompilers, Development Tools, Schematic/PCB Capture and other reverse engineering software. If you used it while reverse engineering, list it here!
== Tool Index ==[https://codisecbinary.comninja/veles/ VelesBinary Ninja]- reverse-engineering platform that can disassemble a binary and display the disassembly in linear or graph views.
[https://binarywww.ninjansa.gov/resources/everyone/ghidra/ Binary NinjaGhidra]- Ghidra is an open source software reverse engineering (SRE) framework developed by NSA's [https://www.nsa.gov/what-we-do/research/ Research] Directorate for NSA's [https://www.nsa.gov/what-we-do/cybersecurity/ cybersecurity mission].
[https://www.nsahex-rays.govcom/resourcesproducts/everyoneida/ghidraIDA] - The IDA Disassembler and Debugger is an interactive, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X. [https:/ Ghidra/codisec.com/veles/ Veles]- Open source tool for binary data analysis (No longer actively developed). <br /> ==Education==Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge.  [https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.

Navigation menu