Skip to content

Latest commit

 

History

History
581 lines (462 loc) · 39 KB

File metadata and controls

581 lines (462 loc) · 39 KB

🛠 Essential Toolkit for Reverse Engineering and Analysis

From unpacking routines to deep static inspection, this toolkit is segmented by task to optimize your workflow and minimize tool-hunting.

🔗 Browse Categories:

  1. 🧪 Analysis
  2. 🧩 Decompilers
  3. 🛠 Dissasembler
  4. 🧾 Hex editor
  5. 🔍 Monitor
  6. 🎨 NFOMaker
  7. 🧰 Other
  8. ⏪ Reverse
  9. 🛡 Rootkits detector
  10. 📦 Unpacking

🧪 Analysis

A collection of tools designed to deeply analyze and interpret software and data behavior.

4n4lDetector

  • Web: https://github.com/4n0nym0us/4n4lDetector
  • Developer: 4n0nym0us
  • Description: 4n4lDetector is an analysis tool for Microsoft Windows executable files, libraries, drivers and mdumps for x86 and x64. As of v1.8 an extended use for analyzing anomalies in Linux ELF executables was also included.

CAPA

  • Web: https://github.com/fireeye/capa
  • Developer: mandiant - www.mandiant.com
  • Description: Capa detects capabilities in executable files. Run this tool against a PE, ELF, or shellcode file and it tells you what it thinks the program can do. For example, it might suggest that the file is a backdoor, is capable of installing services, or relies on HTTP to communicate.

DIE

  • Web: https://github.com/horsicq/DIE-engine
  • Developer: Hors
  • Description: Detect It Easy (DIE) is a static analysis tool designed to identify file types and extract metadata from executables, primarily PE (Portable Executable), ELF, and other binary formats. It leverages a customizable signature-based engine combined with heuristics to detect compilers, packers, protectors, and programming languages used in binary construction.

ExeinfoPe

  • Web: https://github.com/ExeinfoASL/ASL
  • Developer: ASL - http://www.exeinfo.byethost18.com
  • Description: Exeinfo PE is a compact and powerful executable analyzer focused on identifying packers, obfuscators, protectors, and compilers used in binary files, especially Windows PE executables. It scans binaries using a built-in signature database and heuristic methods to provide detailed information about the file’s structure and potential protections.

PE-Bear

  • Web: https://github.com/hasherezade/pe-bear-releases
  • Developer: hasherezade
  • Description: PE-bear is a freeware reversing tool for PE files. Its objective is to deliver fast and flexible “first view” for malware analysts, stable and capable to handle malformed PE files.

PEiD (with plugins and databases)

  • Note: Available using the extra called: Oldies
  • Web: https://web.archive.org/web/20110924071419/http://www.peid.info/
  • Developer: snaker
  • Description: PEiD (short for PE iDentifier) is a well-known professional, extensible packer/cryptor/compiler detecting tool. It’s so powerful that it can detect the types/signatures of almost any PE file packing tools (at present, the number has been more than 600 kinds)

PEStudio

  • Web: https://www.winitor.com/download
  • Developer: winitor
  • Description: PEStudio is a static analysis tool designed to inspect Windows executable files (PE) without executing them. It extracts a wide range of metadata—such as imports, exports, strings, resources, certificates, indicators, and suspicious patterns—to assist in identifying anomalies, malware traits, or indicators of compromise (IOCs).

ProtectionID

  • Note: Available using the extra called: Oldies
  • Web: https://web.archive.org/web/20210331144912/https://protectionid.net/
  • Developer: CDKiller & TippeX
  • Description: ProtectionID is a comprehensive scanner originally developed to detect copy protection schemes in PC games. Over time, it evolved into a versatile tool capable of identifying a wide range of executable protections, packers, cryptors, and .NET obfuscators.

XAPKDetector

  • Web: https://github.com/horsicq/XAPKDetector
  • Developer: Hors
  • Description: XAPKDetector is a static analysis tool for inspecting Android APK and DEX files. It identifies build tools, third-party libraries, and protection mechanisms using both signature and heuristic analysis. Developed by Hors, it is cross-platform (Windows, macOS, Linux) and helps analysts assess app structure and integrity without execution.

XELFViewer

  • Web: https://github.com/horsicq/XELFViewer
  • Developer: Hors
  • Description: XELFViewer is a cross-platform viewer/editor for ELF binaries, supporting Windows, Linux, and macOS. It allows in-depth inspection of ELF headers, sections, segments, and dynamic linking data, making it useful for reverse engineering and binary inspection tasks involving Unix-like systems.

🧩 Decompilers

Tools for decompiling binaries to source code.

[ANDROID] JADX

  • Web: https://github.com/skylot/jadx
  • Developer: skylot
  • Description: JADX is a decompiler for Android's DEX and APK files that translates bytecode into readable Java source code. It includes both CLI and GUI tools, supports resource extraction, and aids reverse engineering of Android applications.

[AUTOIT] Exe2Aut

  • Web: https://web.archive.org/web/20140403232237/https://exe2aut.com/
  • Developer: Unknown
  • Description: Exe2Aut is designed to be the easiest to use and most versatile decompiler for compiled AutoIt3 scripts one could think of. Exe2Aut is even capable of decompiling executables that have been packed and protected using AutoIt3Camo, Themida, Armadillo, Safengine and so forth due to its low level nature.

[AUTOIT] MyAutToExe

[AUTOIT] UnAutoIt

[DELPHI] Dede

  • Note: Available using the extra called: Oldies
  • Web: https://code.google.com/archive/p/dedex/
  • Developer: DaFixer
  • Description: DeDe is a very fast program that can analize executables compiled with Delphi 3,4,5,6, C++Builder and Kylix and give you all dfm files on the target, every published method in well-commented Assembler, and lots of other information.-

[DELPHI] IDR

  • Web: https://github.com/crypto2011/IDR
  • Developer: crypto2011
  • Description: IDR is a decompiler of executable files (EXE) and dynamic libraries (DLL), written in Delphi and executed in Windows32 environment, with the final aim of being capable to restore the most part of initial Delphi source codes from the compiled file.

[DOTNET] dnSpyEx

  • Web: https://github.com/dnSpyEx/dnSpy
  • Developer: dnSpy team
  • Description: dnSpy is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available.

[DOTNET] GrayWolf

[DOTNET] ILSpy

  • Web: https://github.com/icsharpcode/ILSpy
  • Developer: ic#code
  • Description: ILSpy is an open-source .NET decompiler and assembly browser. It provides fast and reliable decompilation of managed binaries.

[JAVA] JD-GUI

  • Web: https://github.com/java-decompiler/jd-gui
  • Developer: the Java Decompiler dev team
  • Description: JD-GUI is a standalone Java decompiler that displays source code from .class files in a readable form. Useful for auditing and code recovery.

[JAVA] Recaf

  • Web: https://github.com/Col-E/Recaf
  • Developer: Matt Coley (Col-E)
  • Description: An easy to use modern Java bytecode editor that abstracts away the complexities of Java programs. Recaf abstracts away constant pool, stack frames, wide instructions, and more.

[PYTHON] PyInstxtractor

  • Web: https://github.com/extremecoders-re/pyinstxtractor
  • Developer: extremecoders-re
  • Description: Python script to extract the contents of a PyInstaller generated Windows executable file. The contents of the pyz file (usually pyc files) present inside the executable are also extracted. The header of the pyc files are automatically fixed so that a Python bytecode decompiler will recognize it.

[PYTHON] Python Decompyle++

  • Web: https://github.com/zrax/pycdc
  • Developer: Michael Hansen, Darryl Pogue, charlietang98, Kunal Parmar, Olivier Iffrig, Zlodiy
  • Description: Decompyle++ is a tool that aims to translate compiled Python byte-code back into valid and human-readable Python source code. It includes both a byte-code disassembler (pycdas) and a decompiler (pycdc), and supports byte-code from any version of Python.

[VB] VBDEC

  • Note: Available using the extra called: VBDEC
  • Web: https://www.sandsprite.com
  • Developer: David Zimmer
  • Description: VBDEC is a lightweight Visual Basic 5/6 decompiler and analysis tool. It allows inspection of VB p-code structures, forms, modules, and runtime behavior by extracting metadata and reconstructing symbolic representations. While not a full decompiler like commercial solutions, VBDEC is useful for basic reverse engineering, educational purposes, and format exploration of legacy VB applications.

🛠 Dissasembler

Resources and tools to disassemble compiled programs.

BDASM

  • Note: Available using the extra called: Oldies
  • Web: www.bsasm.com (closed)
  • Developer: Manuel Jiménez
  • Description: BDASM is a multi-cpu, multi format file disassembler for Windows. Currently it supports ELF, X-Box, PE and raw binary files. The CPU support includes the Intel x86 16/32bits processor family up to SSE2 instructions, and PowerPc 603,604 32bits CPUs.

Cutter

  • Web: https://github.com/rizinorg/cutter
  • Developer: https://rizin.re
  • Description: Cutter is a free and open-source reverse engineering platform powered by Rizin (fork of the radare2 reverse engineering framework). It aims at being an advanced and customizable reverse engineering platform while keeping the user experience in mind. Cutter is created by reverse engineers for reverse engineers.

Ghidra

  • Note: Available using the extra called: Ghidra
  • Web: https://ghidra-sre.org/
  • Developer: NSA
  • Description: Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms.

OllyDbg 1.10 (with plugins and scripts)

  • Note: Available using the extra called: Oldies
  • Web: https://www.ollydbg.de
  • Developer: Oleh Yuschuk
  • Description: OllyDbg is an x86 debugger that emphasizes binary code analysis, which is useful when source code is not available. It traces registers, recognizes procedures, API calls, switches, tables, constants and strings, as well as locates routines from object files and libraries. It has a user friendly interface, and its functionality can be extended by third-party plugins.

w32Dasm (with all versions)

  • Note: Available using the extra called: Oldies
  • Web: https://web.archive.org/web/20020204180925/http://members.home.net/w32dasm/
  • Developer: URSoftware
  • Description: W32DASM is a disassembler: a tool made to translate machine language back into assembly language. It's ideal for those interested in reverse engineering, who want to take code apart and find out how it works. Although W32DASM is ancient since hasn't received updates for a very long time (it's officially discontinued), it works without any trouble on Windows 10.

x64dbg

  • Web: www.x64dbg.com
  • Developer: Duncan Ogilvie (mrexodia)
  • Description: An open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the source code for. There are many features available and a comprehensive plugin system to add your own.

🧾 Hex Editor

Utilities for editing binaries at the byte level.

HxD

  • Web: https://mh-nexus.de/en/hxd
  • Developer: Maël Hörz
  • Description: HxD is a carefully designed and fast hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size. The easy to use interface offers features such as searching and replacing, exporting, checksums/digests, insertion of byte patterns, a file shredder, concatenation or splitting of files, statistics and much more.

ImHex

  • Web: https://github.com/WerWolv/ImHex
  • Developer: WerWolv
  • Description: ImHex is a Hex Editor, a tool to display, decode and analyze binary data to reverse engineer their format, extract informations or patch values in them. What makes ImHex special is that it has many advanced features that can often only be found in paid applications. Such features are a completely custom binary template and pattern language to decode and highlight structures in the data, a graphical node-based data processor to pre-process values before they're displayed, a disassembler, diffing support, bookmarks and much much more.

REHex

  • Web: https://github.com/solemnwarning/rehex
  • Developer: Daniel Collins (solemnwarning)
  • Description: REHex is a cross-platform hex editor designed for reverse engineering tasks. It supports Windows, Linux, and macOS, offering powerful binary analysis capabilities, customizable views, scripting, and pattern matching. Ideal for inspecting and manipulating raw binary data in malware research, exploit development, and low-level debugging.

🔍 Monitor

Software for monitoring system performance and activities.

Api Monitor

  • Web: http://www.rohitab.com/apimonitor
  • Developer: Rohitab
  • Description: This fine tool lets you monitor and control API calls made by applications and services. Its a powerful tool for seeing how applications and services work or for tracking down problems that you have in your own applications.

Autoruns

  • Web: https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns
  • Developer: Sysinternals
  • Description: This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and when you start various built-in Windows applications like Internet Explorer, Explorer and media players.

CurrPorts

  • Web: https://www.nirsoft.net/utils/cports.html
  • Developer: NirSoft
  • Description: CurrPorts is network monitoring software that displays the list of all currently opened TCP/IP and UDP ports on your local computer. For each port in the list, information about the process that opened the port is also displayed, including the process name, full path of the process, version information of the process (product name, file description, and so on), the time that the process was created, and the user that created it.

HollowsHunter

  • Web: https://github.com/hasherezade/hollows_hunter
  • Developer: hasherezade
  • Description: Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).

MultiMon

  • Web: https://www.resplendence.com/multimon_whatsnew
  • Developer: Resplendence Software Projects Sp.
  • Description: MultiMon is an advanced multifunctional system monitoring tool for Windows which displays detailed output of a wide range of activities in real-time. The system monitor displays process and thread creation as well as binary image loading. The file system monitor displays activity from the perspective of the file system. The registry monitor shows registry activity in real time.

PE-sieve

  • Web: https://github.com/hasherezade/pe-sieve
  • Developer: hasherezade
  • Description: PE-sieve is a tool that helps to detect malware running on the system, as well as to collect the potentially malicious material for further analysis. Recognizes and dumps variety of implants within the scanned process: replaced/injected PEs, shellcodes, hooks, and other in-memory patches. Detects inline hooks, Process Hollowing, Process Doppelgänging, Reflective DLL Injection, etc.

Portmon

  • Web: https://docs.microsoft.com/en-us/sysinternals/downloads/portmon
  • Developer: SysInternals
  • Description: Portmon is a utility that monitors and displays all serial and parallel port activity on a system. It has advanced filtering and search capabilities that make it a powerful tool for exploring the way Windows works, seeing how applications use ports, or tracking down problems in system or application configurations.

Process Explorer

Procmon

  • Web: https://docs.microsoft.com/en-us/sysinternals/downloads/procmon
  • Developer: Sysinternals
  • Description: Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. It combines the features of two legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of enhancements.

RegistryChangesView

  • Web: https://www.nirsoft.net/utils/registry_changes_view.html
  • Developer: NirSoft
  • Description: RegistryChangesView is a tool for Windows that allows you to take a snapshot of Windows Registry and later compare it with another Registry snapshots, with the current Registry or with Registry files stored in a shadow copy created by Windows. When comparing 2 Registry snapshots, you can see the exact changes made in the Registry between the 2 snapshots, and optionally export the Registry changes into a standard .reg file of RegEdit.

RegShot

  • Web: https://github.com/Seabreg/Regshot
  • Developer: Seabreg
  • Description: Regshot is a small, free and open-source registry compare utility that allows you to quickly take a snapshot of your registry and then compare it with a second one - done after doing system changes or installing a new software product.

SysAnalyzer

  • Web: https://github.com/dzzie/SysAnalyzer
  • Developer: dzzie
  • Description: SysAnalyzer is an application that was designed to give malcode analysts an automated tool to quickly collect, compare, and report on the actions a binary took while running on the system.

System Informer (formerly known as "Process Hacker 3")

  • Web: https://systeminformer.sourceforge.io
  • Developer: System Informer
  • Description: System Informer is a powerful, open-source system monitoring and debugging tool for Windows. It provides detailed views of processes, threads, modules, network connections, and handles. Designed for advanced users, it enables malware detection, live process memory editing, and service management with granularity beyond Task Manager.

TCPView

🎨 NFOMaker

Tools for creating or editing NFO files.

Ascii Generator 2

  • Web: https://ascgendotnet.jmsoftware.co.uk
  • Developer: Jonathan Mathews
  • Description: Ascii Generator 2 (Ascgen2) is an advanced and open-source Windows application to convert images into high quality ASCII art – text that accurately represents the original image. It is the first and only program of its kind to support output for display in variable width fonts, with real-time output adjustment and much more.

Cool Beans NFO Creator

NFO Maker

  • Web: Unknown
  • Developer: tHE EGOiSTE - The Millenium Group
  • Description: A minimalistic .nfo file generator created by the group tHE EGOiSTE under The Millenium Group. Details and availability are scarce, and the original distribution site is unknown.

🧰 Other

Miscellaneous tools that don't fit into the other categories.

APK Editor Studio

APK Studio

APK Tool GUI

  • Web: https://github.com/AndnixSH/APKToolGUI
  • Developer: AndnixSH
  • Description: GUI for apktool, signapk, zipalign and baksmali utilities. It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications.

AstroGrep

  • Web: https://sourceforge.net/projects/astrogrep
  • Developer: AstroComma Inc.
  • Description: AstroGrep is a Microsoft Windows GUI File Searching (grep) utility. Its features include regular expressions, versatile printing options, stores most recent used paths and has a "context" feature which is very nice for looking at source code.

AVFucker

  • Note: Available using the extra called: Oldies
  • Web: www.indetectables.net
  • Developer: Sr Sombrero
  • Description: AVFucker is a classic evasion tool that modifies known antivirus signature bytes within executable files to bypass detection. It automates the “replace byte signature” technique, often used in packer or crypter workflows.

FLOSS

  • Web: https://github.com/fireeye/flare-floss
  • Developer: mandiant
  • Description: The FLARE Obfuscated String Solver (FLOSS, formerly FireEye Labs Obfuscated String Solver) uses advanced static analysis techniques to automatically deobfuscate strings from malware binaries. You can use it just like strings.exe to enhance basic static analysis of unknown binaries.

HashMyFiles

  • Web: https://www.nirsoft.net/utils/hash_my_files.html
  • Developer: NirSoft
  • Description: HashMyFiles is small utility that allows you to calculate the MD5 and SHA1 hashes of one or more files in your system. You can easily copy the MD5/SHA1 hashes list into the clipboard, or save them into text/html/xml file.

MalUnpack

  • Web: https://github.com/hasherezade/mal_unpack
  • Developer: hasherezade
  • Description: Dynamic unpacker based on PE-sieve. It deploys a packed malware, waits for it to unpack the payload, dumps the payload, and kills the original process.

Indetectables Offset Locator

  • Note: Available using the extra called: Oldies
  • Web: https://www.indetectables.net/viewtopic.php?t=29725
  • Developer: Mingo, Yorll & Metal
  • Description: Indetectables Offset Locator is a legacy tool used to locate and manipulate offsets in PE files to help evade antivirus detection. Commonly used for AV signature cleaning in binaries, it allows manual patching of suspicious byte patterns.

ProcDOT

  • Web: https://www.procdot.com/downloadprocdotbinaries.htm
  • Developer: CERT.at
  • Description: ProcDOT aids malware analysis via visual means, by correlating ProcMon and PCAP data and showing it as an interactive, animated graph. It also detects and shows Thread Injection, smartly follows algorithms, filters out noise, and correlates network events with the involved processes.

RawCap

  • Web: https://www.netresec.com/?page=RawCap
  • Developer: Netresec
  • Description: RawCap is a free command line network sniffer for Windows that uses raw sockets. Can sniff most interface types, including WiFi, WWAN (Mobile Broadband) and PPP interfaces.

Resource Hacker

  • Web: http://www.angusj.com/resourcehacker
  • Developer: Angus Johnson
  • Description: Resource Hacker is a resource editor for 32bit and 64bit Windows applications. It's both a resource compiler aand a decompiler, enabling viewing and editing resources in executables.

RunAsDate

  • Web: https://www.nirsoft.net/utils/run_as_date.html
  • Developer: NirSoft
  • Description: RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn't change the current system date and time of your computer, but it only injects the date/time that you specify into the desired application.

ShowString

  • Note: Available using the extra called: Oldies
  • Web: Unknown
  • Developer: figugegl
  • Description: This little tool shows all ASCII and UNICODE strings in a file. You can edit, copy, paste, sort, search and much more.

Strings

  • Web: https://docs.microsoft.com/en-us/sysinternals/downloads/strings
  • Developer: Sysinternals
  • Description: Strings is a Sysinternals utility that extracts ASCII and Unicode strings from binary files. Commonly used in malware analysis, it helps identify readable content, paths, URLs, or embedded commands within executables.

VirusTotal Uploader

  • Web: https://github.com/SamuelTulach/VirusTotalUploader
  • Developer: Samuel Tulach
  • Description: VirusTotal Uploader is a desktop utility that allows fast file submissions to VirusTotal directly from your machine. It streamlines malware scanning by integrating API-based uploads and result fetching.

WinObjEx64

  • Web: https://github.com/hfiref0x/WinObjEx64
  • Developer: hfiref0x
  • Description: WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the "Properties..." toolbar button to get more information, such as description, attributes, resource usage etc. WinObjEx64 let you view and edit object-related security information if you have required access rights.

All Dlls Dependencies

  • Web: http://jacquelin.potier.free.fr/AllDllDeps/
  • Developer: Jacquelin POTIER
  • Description: All Dlls Dependencies is a static analyzer for DLL dependencies. It is a clone of Dependency Walker supporting Windows 7 and Windows 10 stub DLLs. The tool can analyze modules to find missing imported DLLs or functions, making it useful for identifying dependencies in applications.

⏪ Reverse

Software and techniques for reversing engineering.

ASM Calculator

  • Web: https://www.manhunter.ru/releases/108_32_bit_asm_calculator_1_12.html
  • Developer: ManHunter
  • Description: Allows you to execute arithmetic and bitwise Assembler commands, including commands that use Carry Flag value in calculations. The result of the operation is displayed in hexadecimal with byte reversal, in decimal with sign display, in binary with octets and in text if available.

AT4RE Patcher

  • Web: https://www.at4re.net/f/thread-54.html
  • Developer: Agmcz & Sn!per X
  • Description: AT4RE Patcher is a highly advanced patch generator designed for creating custom binary patches. It features a visual editor, multi-offset patching, and various skinning options, making it one of the most complete patchers available.

CryptoTester

  • Web: https://github.com/Demonslay335/CryptoTester
  • Developer: Michael Gillespie
  • Description: CryptoTester is a cryptographic analysis utility designed to aid in ransomware research. It allows testing of common crypto algorithms and configurations used in malware encryption routines.

dUP

DLest

  • Web: https://github.com/DarkCoderSc/DLest
  • Developer: DarkCoderSc (Jean-Pierre LESUEUR)
  • Description: This powerful Microsoft Windows application is specifically designed to assist developers and malware analysts with the analysis and manipulation of exported functions in Portable Executable (PE) files, particularly DLLs. With DLest, you can easily enumerate exported functions using a variety of methods, including drag and drop, opening a folder, or recursively scanning a folder with regular expression filtering to only include PE files with specific export function names.

ExtremeDumper

  • Web: https://github.com/wwh1004/ExtremeDumper
  • Developer: wwh1004
  • Description: ExtremeDumper is a .NET assembly dumper capable of extracting in-memory .NET modules from running processes. It supports both 32-bit and 64-bit targets and is useful for unpacking and analyzing obfuscated or protected .NET applications.

ImpREC (with plugins)

  • Note: Available using the extra called: Oldies
  • Web: Unknown
  • Developer: MackT/uCF
  • Description: ImpREC (Import Reconstructor) is a classic reverse engineering tool used to reconstruct or repair the Import Address Table (IAT) of packed or manually unpacked PE files. It supports plugin extensions and is essential in many unpacking workflows.

Keygener Assistant

  • Web: https://www.at4re.net/f/thread-47.html
  • Developer: Mr Paradox & dj-siba
  • Description: Convert, analyze, encrypt and process characters to and from an abundance of encodings and formats with this fully-featured calculator and processor.

Process Dump

  • Web: http://split-code.com/processdump.html
  • Developer: Split-Code
  • Description: Process Dump is a Windows reverse-engineering tool to dump malware memory components back to disk for analysis. It uses an aggressive import reconstruction approach to make analysis easier, and supports 32 and 64 bit modules.

Scylla

  • Web: https://github.com/NtQuery/Scylla
  • Developer: The NtQuery team
  • Description: Scylla is a modern alternative to ImpREC for rebuilding the Import Address Table (IAT) of PE files. It supports dumping and fixing in-memory modules, making it a key tool in unpacking and reverse engineering workflows.

Threadtear

  • Web: https://github.com/GraxCode/threadtear
  • Developer: GraxCode
  • Description: Threadtear is a multifunctional deobfuscation tool for java. Android application support is coming soon (Currently working on a dalvik to java converter). Suitable for easier code analysis without worrying too much about obfuscation.

uPPP

  • Web: https://forum.tuts4you.com/forum/120-uppp/
  • Developer: Ufo-Pu55y
  • Description: uPPP is a patch generator similar to dUP and AT4RE Patcher, offering a simple GUI for creating binary patches. It requires the .NET 2.0 runtime and targets Windows systems.

WinAPI Search

  • Web: https://dennisbabkin.com/winapisearch/
  • Developer: Dennis Babkin
  • Description: WinAPI Search app was designed primarily for Windows developers, researchers and malware reverse engineers. Its original goal was to provide a utility to search for Win32 functions by name, but this app later grew to include additional functionality.

x64dbg Plugin Manager

  • Web: https://github.com/horsicq/x64dbg-Plugin-Manager
  • Developer: Hors
  • Description: x64dbg Plugin Manager is a graphical utility to manage, install, and update plugins for the x64dbg debugger. It streamlines plugin handling for reverse engineering workflows.

XOpCodeCalc

  • Web: https://github.com/horsicq/XOpcodeCalc
  • Developer: Hors
  • Description: XOpCodeCalc is a cross-platform x86/x64 opcode calculator for quick encoding/decoding of machine instructions. Useful in shellcode crafting and low-level RE tasks.

🛡 Rootkits Detector

Tools specifically for detecting and handling rootkits.

GMER

  • Web: www.gmer.net
  • Developer: The GMER dev team.
  • Description: GMER is a specialized anti-rootkit scanner for Windows. It detects hidden processes, modules, services, and other stealth techniques used by advanced malware. Often used in incident response and forensic analysis.

Sysinspector

  • Web: https://www.eset.com/int/support/sysinspector/
  • Developer: ESET
  • Description: SysInspector scans your operating system and captures details such as running processes, registry content, startup items and network connections. ESET SysInspector is a convenient utility for the toolbox of every IT expert and first responder.

Windows Kernel Explorer

  • Web: https://github.com/AxtMueller/Windows-Kernel-Explorer
  • Developer: Axt Müller (AxtMueller)
  • Description: Windows Kernel Explorer is a free but powerful kernel research tool. It supports from Windows XP to Windows 11. Compared with WIN64AST and PCHunter, WKE can run on the latest Windows 11 without updating binary files.

📦 UnPacking

Utilities for unpacking and decompressing files and binaries.

De4Dot

  • Web: https://github.com/de4dot/de4dot
  • Developer: de4dot
  • Description: de4dot is an open source .NET deobfuscator and unpacker written in C#. It will try its best to restore a packed and obfuscated assembly to almost the original assembly. Most of the obfuscation can be completely restored (eg. string encryption), but symbol renaming is impossible to restore since the original names aren't (usually) part of the obfuscated assembly.

GUnPacker

  • Note: Available using the extra called: Oldies
  • Web: Unknown
  • Developer: Unknown
  • Description: This tool is a generic unpacker. It has two main functionalities: (A) OEP positioning, and (B) the dumped code and data can be used to repair the follow-up of a PE header. From Chinese developers. Competitor of Quick Unpack.

NETUnpack

  • Note: Available using the extra called: Oldies
  • Web: https://ntcore.com/?page_id=353
  • Developer: Erik Pistelli (NTCore)
  • Description: This is a program to dump .NET packed applications. Of course no serious .NET protection relies on packing. In fact, this software shows how easily you can unpack a protected assemly.

QUnpack

  • Web: https://www.at4re.net/f/thread-24.html
  • Developer: Archer & FEUERRADER
  • Description: The program is intended for a dynamic unpacking of binders, crypters, packers and protectors. QuickUnpack tries to bypass all possible scramblers/obfuscators and restores redirected import. From the version 1 the opportunity of unpacking dll is added. From the version 2 the attach process feature added which allows to use QuickUnpack as a dumper and import recoverer. Scripts are also supported from version 2 which allows unpacking of more complicated protections. Version 3 brought x64 support and hardware virtualization debugging engine. This makes QuickUnpack a unique software product which has no similar analogues in the world!

RL!dePacker (with unpack SDK)

  • Note: Available using the extra called: Oldies
  • Web: http://www.reversinglabs.com
  • Developer: Ap0x
  • Description: Reversing Labs RL!dePacker has a build in option to detect OEP. However this option does not work with VB (always use FindOEP! function with VB applications and Force to manual OEP?) and some packers. So if RL!dePacker can not unpack the file use FindOEP! function to detect correct OEP, but use it only as a second resort since it can be jammed! Generic unpacker can unpack ONLY packers that do not use IAT redirection, that don’t steal APIs and which fill out IAT table in correct order. All ordinals that can be converted to API names are converted, others are inserted into IAT as ordinals!

UniExtract 2

  • Web: https://github.com/Bioruebe/UniExtract2
  • Developer: Bioruebe
  • Description: Universal Extractor 2 is a tool designed to extract files from any type of extractable file. Unlike most archiving programs, UniExtract is not limited to standard archives such as .zip and .rar. It can also deal with application installers, disk images and even game archives and other multimedia files. An overview of supported file types can be found here

VMUnpacker (with all versions)

  • Note: Available using the extra called: Oldies
  • Web: https://web.archive.org/web/20080318210939/http://dswlab.com/d3.html
  • Developer: dswlab
  • Description: This tool uses the technology of Virtual Machines. It can unpack various known & unknown shells. It is suitable for unpacking the shelled Trojan horse in virus analysis, and because all codes are run under the VM, they will not take any danger to your system.

Magicmida

  • Note: Available using the extra called: Unpacking
  • Web: https://github.com/Hendi48/Magicmida
  • Developer: Hendi48
  • Description: Magicmida is a Themida auto-unpacker that works on some 32-bit applications. It works on all versions of Windows.

NoVmp

  • Note: Available using the extra called: Unpacking
  • Web: https://github.com/can1357/NoVmp
  • Developer: Can Bölük
  • Description: A static devirtualizer for VMProtect x64 3.x powered by VTIL.

VMUnprotect

  • Note: Available using the extra called: Unpacking
  • Web: https://github.com/void-stack/VMUnprotect
  • Developer: voidstack
  • Description: VMUnprotect is a project engaged in hunting virtualized VMProtect methods. It makes use of Harmony to dynamically read VMP behavior. Currently only supports method administration. Works on VMProtect 3.6.0 (Latest) and few versions back.

VMUnprotect Dumper

  • Note: Available using the extra called: Unpacking
  • Web: https://github.com/void-stack/VMUnprotect.Dumper
  • Developer: voidstack
  • Description: VMUnprotect.Dumper is a project engaged in hunting tampered VMProtect assemblies. It makes use of AsmResolver to dynamically unpack VMP protected assembly. Works on VMProtect 3.7.0 (Latest) and few versions back.

XVolkolak

  • Web: https://horsicq.github.io/
  • Developer: Hors
  • Description: XVolkolak is an unpacker emulator. Unlike programs of this type, it does not use DebugAPI and other features of the operating system. Everything is emulated. You can safely unpack malware for further investigation without the risk of damaging the system. All machine instructions are not executed on a real processor, so unpacking occurs regardless of the processor type and the operating system.