Robertvokac (talk | contribs) No edit summary |
Robertvokac (talk | contribs) No edit summary |
||
(3 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
== EXE files editing == | |||
It is possible to edit the EXE files with a hex editor. | |||
== Disassembling == | |||
Example of disassemblers: IDA, Ghidra. | |||
== Types of reverse engineering == | == Types of reverse engineering == | ||
Line 11: | Line 18: | ||
Ghidra | Ghidra | ||
Cutter | |||
* https://cutter.re | |||
ReClass.NET | |||
== Assembly code == | |||
== Debuggers == | |||
Program, which sets breakpoints at different steps of program execution | |||
=== x64dbg === | |||
https://x64dbg.com | |||
== External links == | == External links == | ||
https://cheatengine.org | https://cheatengine.org |
Latest revision as of 13:04, 9 November 2024
EXE files editing
It is possible to edit the EXE files with a hex editor.
Disassembling
Example of disassemblers: IDA, Ghidra.
Types of reverse engineering
Static
Program is not running.
Dynamic
Program is running.
Dissassemblers
IDA
Ghidra
Cutter
ReClass.NET
Assembly code
Debuggers
Program, which sets breakpoints at different steps of program execution