All about Reverse Engineering

angr

CTF | Python | Tools

angr is a python framework for analyzing binaries. It combines both static and dynamic symbolic ("concolic") analysis, making it applicable to a variety of tasks.


BinDiff (zynamics)

Tools

IDA plugin for comparing binaries. Allows to label unkown binaries with annotations from a different IDA database.


Debin: Predicting Debug Information in Stripped Binaries

CTF | Tools

Debin is a tool to predict the debug information of stripped binaries. It only works relyable with C programs, as this is the only dataset it was trained on. It might be useful to use the website for jeopardy CTFs.


Ghidra

CTF | Tools

Ghidra software reverse engineering (SRE) framework and IDA Pro alternative.


IDA - Interative Disassembler

Tools

THE reverse engineering tool.


libc database search

Datasets

Online interface to find a libc database by function offsets. It is powered by the libc-database repository.


One Gadget

Tools

A tool to find the one gadget in libc. It list all gadgets leading to execve('/bin/sh', NULL, NULL) including their preconditions.


RetDec - Retargetable Decompiler

Tools

A standalone decompiler build and managed by Avast. Works as a standalone program, has a trial version on the website, and there is an IDA Plugin.

Supported file formats: ELF, PE, Mach-O, COFF, AR (archive), Intel HEX, and raw machine code. Supported architectures (32b only): Intel x86, ARM, MIPS, PIC32, and PowerPC.


Snowman Decompiler

Tools

A standalone C decompiler. Also has an IDA plugin.

Supports ARM, x86, and x86-64 architectures. Reads ELF, Mach-O, and PE file formats.