Robertvokac (talk | contribs) |
Robertvokac (talk | contribs) No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
== EXE files editing == | |||
It is possible to edit the EXE files with a hex editor. | |||
== Disassembling == | |||
Example of disassemblers: IDA, Ghidra. | |||
== Types of reverse engineering == | == Types of reverse engineering == | ||
Line 15: | Line 22: | ||
* https://cutter.re | * https://cutter.re | ||
ReClass.NET | |||
== Assembly code == | == Assembly code == |
Latest revision as of 13:04, 9 November 2024
EXE files editing
It is possible to edit the EXE files with a hex editor.
Disassembling
Example of disassemblers: IDA, Ghidra.
Types of reverse engineering
Static
Program is not running.
Dynamic
Program is running.
Dissassemblers
IDA
Ghidra
Cutter
ReClass.NET
Assembly code
Debuggers
Program, which sets breakpoints at different steps of program execution