Changes

Jump to navigation Jump to search
1,349 bytes added ,  15:56, 23 November 2020
[[Why RECESSIMFile:Schematic Capture.png|thumb|Schematic of an embedded device]] || Disassemblers, Decompilers, Development Tools, Schematic/PCB Capture and other reverse engineering software. If you used it while reverse engineering, list it here!==Tool Index==[https://binary.ninja/ Binary Ninja] - reverse-engineering platform that can disassemble a binary and display the disassembly in linear or graph views. [How to Contributehttps://www.nsa.gov/resources/everyone/ghidra/ Ghidra]- Ghidra is an open source software reverse engineering (SRE) framework developed by NSA's [https://www.nsa.gov/what-we-do/research/ Research]Directorate for NSA's [https://www.nsa.gov/what-we-do/cybersecurity/ cybersecurity mission]. [https://www.hex-rays.com/products/ida/ IDA] -The IDA Disassembler and Debugger is an interactive, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X. [https://codisec.com/veles/ Veles] -Open source tool for binary data analysis (No longer actively developed). <br /> ==Education==Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge.  [https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.

Navigation menu