Reversing & Binary Exploit
Tools designed to aid in the reverse engineering of binaries and assist in exploit development
Tool | Description | Source |
Buffer-Overflow | This tool is created in order to allow penetration testers / researchers to quickly test out simple buffer overflows, without having to write a line of code | |
CAPE | Malware configuration and payload extraction tool | |
dotPeek | .Net decompiler tool | |
fuzza | Customizable TCP fuzzing tool to test for remote buffer overflows | |
GDB-Peda | GDB is included in most Linux distros (or is easily available) Peda is an extension for GDB. Used for debugging software/reverse engineering/exploit development | |
Ghidra | NSA Developed - Reverse Engineering Software | |
IDA free | Reversing and Debugging Tool | |
Immunity Debugger | Reversing/Exploit development/Debugger | |
Inhale | Malware analysis and classification tool | |
JD-GUI | Java Decompiler - Can be used to open and view and modify .Jar .Class etc | |
Malice | Malice's mission is to be a free open source version of VirusTotal that anyone can use at any scale | |
mona | Mona.py is a python script that can be used to automate and speed up specific searches while developing exploits | |
NodeJsScan | ||
OneFuzz | Self hosted Fuzzing-as-a-service | |
Overflow-Helper | Assists with automating parts of Buffer-Overflows | |
Peframe | Static Analyses of Portable Exectuable malware and generic suspicious files | |
pestudio | Spots suspicious artifacts within executable files | |
ropstar | Exploits simple linux bof challenges involving alsr, nx and to some extend format strings. You can let it get you a shell or specify a win function that is called | |
Tr-ID | File identification tool | |
x64dbg | Open-source debugger for Windows |
Last updated