Search results
Results From The WOW.Com Content Network
objdump is a command-line program for displaying various information about object files on Unix-like operating systems.For instance, it can be used as a disassembler to view an executable in assembly form.
A disassembler differs from a decompiler, which targets a high level language rather than assembly language. Disassembly , the output of a disassembler, is often formatted for human-readability rather than suitability for input to an assembler, making it principally a reverse-engineering tool.
A length disassembler, also known as length disassembler engine (LDE), is a tool that, given a sequence of bytes (instructions), outputs the number of bytes taken by the parsed instruction. Notable open source projects for the x86 architecture include ldisasm, [ 8 ] Tiny x86 Length Disassembler [ 9 ] and Extended Length Disassembler Engine for ...
Radare2 (also known as r2) is a complete framework for reverse-engineering and analyzing binaries; composed of a set of small utilities that can be used together or independently from the command line. Built around a disassembler for computer software which generates assembly language source code from machine-executable code, it supports a ...
The Interactive Disassembler (IDA) is a disassembler for computer software which generates assembly language source code from machine-executable code. It supports a variety of executable formats for different processors and operating systems. It can also be used as a debugger for Windows PE, Mac OS X Mach-O, and Linux ELF executables.
OllyDbg is often used for reverse engineering of programs. [9] It is often used by crackers to crack software made by other developers. For cracking and reverse engineering, it is often the primary tool because of its ease of use and availability; any 32-bit executable can be used by the debugger and edited in bitcode/assembly in realtime. [10]
HIEW, sometimes given as Hiew, (short for Hacker's view) is a console hex editor for Windows written by Eugene Suslikov (sen). Amongst its feature set is its ability to view files in text, hex and disassembly mode.
The decompiler component is written in C++, and is therefore usable in a stand-alone form. [ 7 ] Scripts to perform automated analysis with Ghidra can be written in Java or Python (via Jython ), [ 8 ] [ 9 ] though this feature is extensible and support for other programming languages is available via community plugins. [ 10 ]