angr is a python framework for analyzing binaries. It combines both static and dynamic symbolic ("concolic") analysis, making it applicable to a variety of tasks.
IDA plugin for comparing binaries. Allows to label unkown binaries with annotations from a different IDA database.
Debin is a tool to predict the debug information of stripped binaries. It only works relyable with C programs, as this is the only dataset it was trained on. It might be useful to use the website for jeopardy CTFs.
Ghidra software reverse engineering (SRE) framework and IDA Pro alternative.
THE reverse engineering tool.
Online interface to find a libc database by function offsets. They are powered by the libc-database repository.
A tool to find the one gadget in libc.
It list all gadgets leading to
execve('/bin/sh', NULL, NULL) including their preconditions.
A standalone decompiler build and managed by Avast. Works as a standalone program, has a trial version on the website, and there is an IDA Plugin.
Supported file formats: ELF, PE, Mach-O, COFF, AR (archive), Intel HEX, and raw machine code. Supported architectures (32b only): Intel x86, ARM, MIPS, PIC32, and PowerPC.
A standalone C decompiler. Also has an IDA plugin.
Supports ARM, x86, and x86-64 architectures. Reads ELF, Mach-O, and PE file formats.