All about Reverse Engineering


CTF | Python | Tools

angr is a python framework for analyzing binaries. It combines both static and dynamic symbolic ("concolic") analysis, making it applicable to a variety of tasks.

Binary Ninja Cloud

CTF | Tools

The cloud version of binary ninja allows free reversing in the cloud. It has a real-time collaboration feature.

BinDiff (zynamics)


IDA plugin for comparing binaries. Allows to label unkown binaries with annotations from a different IDA database.

Debin: Predicting Debug Information in Stripped Binaries

CTF | Tools

Debin is a tool to predict the debug information of stripped binaries. It only works relyable with C programs, as this is the only dataset it was trained on. It might be useful to use the website for jeopardy CTFs.


CTF | Tools

Ghidra software reverse engineering (SRE) framework and IDA Pro alternative.

IDA - Interative Disassembler


THE reverse engineering tool.

libc Database Search

CTF | Datasets

Online interface to find a libc database by function offsets. They are powered by the libc-database repository.

One Gadget


A tool to find the one gadget in libc. It list all gadgets leading to execve('/bin/sh', NULL, NULL) including their preconditions.

Online Disassembler

CTF | Tools | x86

The online disassembler can disassemble a wide range of binary formats and platforms. It can disassemble free-standing bytes too. It provides a disassembly view, a graph view, a symbols and a function viewer.

RetDec - Retargetable Decompiler


A standalone decompiler build and managed by Avast. Works as a standalone program, has a trial version on the website, and there is an IDA Plugin.

Supported file formats: ELF, PE, Mach-O, COFF, AR (archive), Intel HEX, and raw machine code. Supported architectures (32b only): Intel x86, ARM, MIPS, PIC32, and PowerPC.

Snowman Decompiler


A standalone C decompiler. Also has an IDA plugin.

Supports ARM, x86, and x86-64 architectures. Reads ELF, Mach-O, and PE file formats.