Reverse Engineering

Perform reverse engineering on multiple software and discover vulns.

15 listed tools Last update on 2025-04-28

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

binwalk 

Open-source    

Analyze, reverse engineer, and extract firmware images

Capstone 

Open-source    

Lightweight multi-platform, multi-architecture disassembly framework

dnSpy 

Open-source    

.Net debugger and assembly tool

Evan's Debugger 

Open-source    

Debugger for GNU/Linux

Immunity Debugger 

Commercial    

Debugger with exploit and malware capabilities

Interactive Disassembler (IDA Pro) 

Commercial    

A multi-processor disassembler and debugger with free/premium versions

Medusa 

Open-source    

Open source, cross-platform interactive disassembler

peda 

Open-source    

Python Exploit Development Assistance for GDB

plasma 

Open-source    

Interactive disassembler for x86/ARM/MIPS

PyREBox 

Open-source    

Python scriptable Reverse Engineering sandbox and framework

Radare2 

Open-source    

Toolchain for forensics, software reverse engineering, exploiting, debugging, etc.

rVMI 

Open-source    

Full system analysis via virtual machine introspection

Voltron 

Open-source    

Debugger UK for hackers

WDK/WinDbg 

Commercial    

Microsoft Windows Driver Kit and WinDbg

x64dbg 

Open-source    

Open source x64/x32 debugger