angr is a python framework for analyzing binaries. It combines both static and dynamic symbolic ("concolic") analysis, making it applicable to a variety of tasks.
The cloud version of binary ninja allows free reversing in the cloud. It has a real-time collaboration feature.
https://zynamics.com/software.html
Tools
IDA plugin for comparing binaries. Allows to label unkown binaries with annotations from a different IDA database.
Debin is a tool to predict the debug information of stripped binaries. It only works relyable with C programs, as this is the only dataset it was trained on. It might be useful to use the website for jeopardy CTFs.
Ghidra software reverse engineering (SRE) framework and IDA Pro alternative.
https://hex-rays.com/ida-free/
Tools
THE reverse engineering tool.
Online interface to find a libc database by function offsets. They are powered by the libc-database repository.
https://github.com/david942j/one_gadget
Tools
A tool to find the one gadget in libc.
It list all gadgets leading to execve('/bin/sh', NULL, NULL)
including their preconditions.
https://onlinedisassembler.com/odaweb/
CTF | Tools | x86
The online disassembler can disassemble a wide range of binary formats and platforms. It can disassemble free-standing bytes too. It provides a disassembly view, a graph view, a symbols and a function viewer.
A standalone decompiler build and managed by Avast. Works as a standalone program, has a trial version on the website, and there is an IDA Plugin.
Supported file formats: ELF, PE, Mach-O, COFF, AR (archive), Intel HEX, and raw machine code. Supported architectures (32b only): Intel x86, ARM, MIPS, PIC32, and PowerPC.
A standalone C decompiler. Also has an IDA plugin.
Supports ARM, x86, and x86-64 architectures. Reads ELF, Mach-O, and PE file formats.