Tag Archives: re
Read Portable Executable (PE) information

PEview provides a quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component…

Extract resources from Windows binaries

Resource Hacker™ has been designed to be the complete resource editing tool: compiling, viewing, decompiling and recompiling resources for both…

Detect packers, cryptors and compilers

PEiD is used to detect most common packers, cryptors and compilers found in PE executable files. The current version of…

Write exploits, analyze malware, and reverse engineer binary files

Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on…

PaiMei – a reverse engineering framework written in Python

PaiMei, is a reverse engineering framework consisting of multiple extensible components. The framework can essentially be thought of as a…

Create fake services for malware analysis

INetSim is a software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour…

Registry snapshots

Regshot is an open-source (LGPL) registry compare utility that allows you to quickly take a snapshot of your registry and…

Control DNS Responses

Mandiant ApateDNS is a tool for controlling DNS responses. As a phony DNS server, Mandiant ApateDNS spoofs DNS responses to…

Detect executable dependencies

Dependency Walker – scans any 32-bit or 64-bit Windows module (exe, dll, ocx, sys, etc.) and builds a hierarchical tree…

Reversing with OBJDUMP

objdump – display plenty of information from object files. It is available in most Linux and Unix systems. It is…

Previous Page · Next Page