Changes

Jump to navigation Jump to search
1,049 bytes added ,  15:56, 23 November 2020
[[Why RECESSIM]] File:Schematic Capture.png|thumb| [[How to ContributeSchematic of an embedded device]]----Disassemblers, Decompilers, Development Tools, Schematic/PCB Capture and other reverse engineering software. If you used it while reverse engineering, list it here!----==Tool Index==[https://codisecbinary.com/velesninja/ VelesBinary Ninja]- reverse-engineering platform that can disassemble a binary and display the disassembly in linear or graph views.
[https://binarywww.ninjansa.gov/resources/everyone/ghidra/ Binary NinjaGhidra]- Ghidra is an open source software reverse engineering (SRE) framework developed by NSA's [https://www.nsa.gov/what-we-do/research/ Research] Directorate for NSA's [https://www.nsa.gov/what-we-do/cybersecurity/ cybersecurity mission].
[https://www.nsahex-rays.govcom/resourcesproducts/everyoneida/ IDA] - The IDA Disassembler and Debugger is an interactive, programmable, extensible, multi-processor disassembler hosted on Windows, Linux, or Mac OS X. [https:/ghidra/ Ghidracodisec.com/veles/ Veles]- Open source tool for binary data analysis (No longer actively developed).
<br />
 
==Education==
Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge.
 
[https://github.com/mytechnotalent/Reverse-Engineering-Tutorial Reverse Engineering Tutorial] - A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.

Navigation menu