Tag Archives: Reverse-Engineering

Resource Hacker – Application Compiler & Decompiler

Resource Hacker is a resource editor for 32bit and 64bit Windows® applications. It’s both a resource compiler (for *.rc files), and a decompiler

RetDec – Machine-code Decompiler Based on LLVM

RetDec is a retargetable machine-code decompiler based on LLVM. The decompiler is not limited to any particular target architecture, operating system

PyREBox – Python scriptable Reverse Engineering Sandbox

PyREBox is a Python scriptable Reverse Engineering sandbox. It is based on QEMU, and its goal is to aid reverse engineering by providing dynamic analysis and debugging capabilities from a different perspective.

APK Studio – Cross-platform for Reversing Android Applications

APK Studio is a cross-platform IDE for reverse-engineering (decompiling/editing) & recompiling of android application binaries within a single user-interface

Smalisca – Static Code Analysis for Smali files

Studying the application and learning more about what it is really doing on the system is very important. Android applications are similar to any other application that may include suspicious and malicious software. If you are looking to investigate this

PortEx- Java Library for Static Analysis of PE File

PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala, and targeted at Java applications. some of the features are:

iRET – iOS Reverse Engineering Toolkit

iRET is an open source tool that you can use to analyze and evaluate iOS applications. The toolkit includes the following features: Binary Analysis where you can check the binary encryption , architecture of the application and if it has