![]() Modify Android DEX/APK files at source-level using Java. This code dissects the internal data structures in ELF files. NET Decompiler and Assembly Browser.įull featured multi arch/os debugger built on top of PyQt5 and frida.īinary debugger disassembler exploitation mobile reversingĭynamoRIO is a runtime code manipulation system that supports code transformations on any part of a program, while it executes.Ĭollection of ELF utilities (includes sstrip) It supports x86 and x86_64 archs and runs under Linux.įree. Utilities to handle ELF object files and DWARF debugging information. Looks for all export and import names that contain a specified string in all Portable Executable in a directory tree.Ī Dynamic Symbolic Execution (DSE) engine for JavaScript The ERESI Reverse Engineering Software Interface.Ī simple utility to convert EXE files to JPEG images and vice versa.Ī tool to detect anomalies in PE (Portable Executable) files. Open source Flash SWF decompiler and editor. Pull decrypted ipa from jailbreak device. Yet another frida based iOS dumpdecrypted.Ī byte code analyzer for finding deserialization gadget chains in Java applications.īrowser-based gdb frontend using Flask and JavaScript to visually debug C, C++, Go, or Rust.Ī Python framework for finding C structures from process memory - heap analysis - Memory structures forensics.Ī special payload generator that can bypass all antivirus software.Ĭonverts Motorola and Intel hex files to binary. #Hopper disassembler kali linux generator Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches). Reverse engineering tool that lets you disassemble, decompile and debug your applications.Ī runtime encrypter for 32-bit portable executables. Small tool to package javascript into a valid image file. Tool to analyzse JPEG images Reads binary files and parses the JPEG markers inside them. ![]() The decompilation engine of JustDecompile. ![]() Tool written as a bash script to facilitate some aspects of an Android Assessment Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe.Ī symbolic virtual machine built on top of the LLVM compiler infrastructure. Tool for injecting a shared object into a Linux process.
0 Comments
Leave a Reply. |