Skip to content

Latest commit

 

History

History
88 lines (59 loc) · 4.77 KB

README.md

File metadata and controls

88 lines (59 loc) · 4.77 KB

Reversing Bits Cheatsheets

Welcome to the Reversing Bits Cheatsheets repository! This collection provides comprehensive guides on various tools essential for assembly programming, reverse engineering, and binary analysis. Each cheatsheet offers installation instructions, usage examples, and advanced tips for different operating systems.

Website: https://mohitmishra786.github.io/reversingBits/

Tools Included

Assembly & Basic Analysis

  • NASM: A popular assembler for the x86 and x86-64 architectures.
  • GAS: GNU Assembler, part of the GNU Binutils project, used for assembling AT&T syntax assembly.
  • objdump: A powerful tool for displaying information about object files.
  • Hexdump: Used to display or dump binary data in hexadecimal format.
  • strings: Extracts printable strings from files, useful for quick analysis.
  • file: Determines file type by examining its contents.
  • nm: Lists symbols from object files.
  • readelf: Displays information about ELF (Executable and Linkable Format) files.

Debuggers & Dynamic Analysis

  • GDB: The GNU Debugger for debugging programs at the source or assembly level.
  • OllyDbg: A 32-bit assembler level debugger for Windows.
  • WinDbg: Microsoft's debugger for Windows applications.
  • QEMU: Emulator and virtualizer for cross-platform analysis.
  • Valgrind: Tool suite for debugging and profiling Linux programs.
  • Unicorn: Lightweight, multi-platform CPU emulator framework.

Disassemblers & Decompilers

  • IDA Pro: Industry-standard disassembler and debugger.
  • Ghidra: NSA's software reverse engineering suite.
  • Binary Ninja: Modern reverse engineering platform.
  • Hopper: Reverse engineering tool for macOS and Linux.
  • RetDec: Retargetable machine-code decompiler.
  • Radare2: Complete framework for reverse-engineering.
  • Rizin: Fork of radare2 with enhanced features.

Binary Analysis Frameworks

  • Angr: Python framework for binary analysis.
  • BAP: Binary Analysis Platform for reverse engineering.
  • Capstone: Lightweight multi-architecture disassembly framework.
  • Dyninst: Binary instrumentation and analysis library.
  • Frida: Dynamic instrumentation toolkit.
  • PIN: Intel's dynamic binary instrumentation framework.
  • Binary Ninja Cloud: Cloud-based reverse engineering platform by Vector 35.
  • Cutter: A free and open-source reverse engineering platform based on the QEMU emulator and the Capstone disassembly engine.
  • Binary Analysis Tool (BAT): A framework for automated binary code analysis, providing a unified interface for various binary analysis tools.
  • Miasm: A reverse engineering framework written in Python, focused on advanced binary analysis and code instrumentation.
  • Triton: A dynamic binary analysis framework based on PIN, providing a powerful constraint solver for symbolic execution.
  • PEDA: Python Exploit Development Assistance for GDB, enhancing the GDB debugger with additional functionality for reverse engineering.
  • .NET IL Viewer: A tool for analyzing .NET assemblies, allowing you to view the disassembled code and metadata.
  • Snowman: A decompiler for x86/x64 binaries, providing a graphical user interface and support for multiple file formats.

Malware Analysis & Security

  • YARA: Pattern matching tool for malware analysis.
  • Zynamics: Binary difference analysis tools.
  • Intel XED: X86 encoder decoder library.
  • Spike: Network protocol fuzzer.
  • FrEEdom: Binary analysis framework.
  • Diaphora: Advanced binary diffing tool for IDA Pro.

How to Use

  • Installation: Follow the OS-specific instructions in each cheatsheet for tool installation.
  • Usage: Each file contains usage examples, common commands, and advanced tips.
  • Contributing: If you have improvements or additional tools to add, please fork the repository, make your changes, and submit a pull request.

License

This repository is licensed under the MIT License - see the LICENSE file for details.

Acknowledgements

  • Thanks to the developers and communities behind these tools for their invaluable resources.
  • Contributions are always appreciated! Check the CONTRIBUTING.md for guidelines on how to contribute.