Skip to content

Latest commit

 

History

History
12 lines (8 loc) · 1.04 KB

README.md

File metadata and controls

12 lines (8 loc) · 1.04 KB

Here are my notes from learning tools:

The following is an ever-growing list of tools you should know about:

  • PwnDbg GDB module -- Python module that allows for advanced GDB commands, visual modes, and generally useful functionality that should have already been built in
  • PEDA is the predecessor to PwnDbg -- Python Exploit Development Assistance for GDB.
  • Radare2 is a rewrite of Radare and allows for disassembling and debugging of most any binary format and archtecture.
  • Capstone disassembler -- engine that allows a number of utilities (including Unicorn) to reverse engineer and analyze executable binaries in a variety of architectures
  • Unicorn emulator -- uses QEMU to allow you to debug executables with different architectures (x86, x64, ARM, ARM64, MIPS, PowerPC, Sparc, ...) and from different platforms (Windows, Linux, Android, iOS, ...)