{"id":43976820,"url":"https://github.com/cybersecurity-dev/awesome-reverse-engineering","last_synced_at":"2026-02-07T08:31:07.475Z","repository":{"id":307905711,"uuid":"1031042394","full_name":"cybersecurity-dev/awesome-reverse-engineering","owner":"cybersecurity-dev","description":"Awesome Reverse Engineering","archived":false,"fork":false,"pushed_at":"2025-09-14T10:53:41.000Z","size":18,"stargazers_count":2,"open_issues_count":0,"forks_count":0,"subscribers_count":0,"default_branch":"main","last_synced_at":"2025-09-14T12:31:42.441Z","etag":null,"topics":["android-reverse-engineering","linux-reverse-engineering","reverse-engineering","reverseengineering","windows-reverse-engineering"],"latest_commit_sha":null,"homepage":"https://cyberthreatdefence.com/","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"cc0-1.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/cybersecurity-dev.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2025-08-02T22:04:08.000Z","updated_at":"2025-09-14T10:53:44.000Z","dependencies_parsed_at":"2025-08-03T00:09:27.046Z","dependency_job_id":"7e971298-19e8-4a87-96d0-369094ed8628","html_url":"https://github.com/cybersecurity-dev/awesome-reverse-engineering","commit_stats":null,"previous_names":["cybersecurity-dev/awesome-reverse-engineering"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/cybersecurity-dev/awesome-reverse-engineering","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2Fawesome-reverse-engineering","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2Fawesome-reverse-engineering/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2Fawesome-reverse-engineering/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2Fawesome-reverse-engineering/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/cybersecurity-dev","download_url":"https://codeload.github.com/cybersecurity-dev/awesome-reverse-engineering/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/cybersecurity-dev%2Fawesome-reverse-engineering/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":29190167,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-02-07T07:37:03.739Z","status":"ssl_error","status_checked_at":"2026-02-07T07:37:03.029Z","response_time":63,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["android-reverse-engineering","linux-reverse-engineering","reverse-engineering","reverseengineering","windows-reverse-engineering"],"created_at":"2026-02-07T08:31:06.811Z","updated_at":"2026-02-07T08:31:07.467Z","avatar_url":"https://github.com/cybersecurity-dev.png","language":null,"readme":"\u003cdiv align=\"center\"\u003e\n    \n# **`Awesome`** [Reverse](https://wikipedia.org/wiki/Static_program_analysis) [Engineering](https://wikipedia.org/wiki/Dynamic_program_analysis) [![Awesome](https://awesome.re/badge.svg)](https://awesome.re)\n\u003c/div\u003e\n\n[![Android](https://img.shields.io/badge/Android-3DDC84?style=for-the-badge\u0026logo=android\u0026logoColor=white)](https://github.com/cybersecurity-dev/awesome-android-reverse-engineering)\n[![Linux](https://img.shields.io/badge/Linux-FCC624?style=for-the-badge\u0026logo=linux\u0026logoColor=black)](https://github.com/cybersecurity-dev/awesome-linux-reverse-engineering)\n[![Windows](https://custom-icon-badges.demolab.com/badge/Windows-0078D6?style=for-the-badge\u0026logo=windows11\u0026logoColor=white)](https://github.com/cybersecurity-dev/awesome-windows-reverse-engineering)\n[![Reddit](https://img.shields.io/badge/Reddit-FF4500?style=for-the-badge\u0026logo=reddit\u0026logoColor=white)](https://www.reddit.com/r/ReverseEngineering/) \n\n\u003cp align=\"center\"\u003e\n    \u003ca href=\"https://github.com/cybersecurity-dev/\"\u003e\u003cimg height=\"25\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/github.svg\" alt=\"GitHub\"\u003e\u003c/a\u003e\n    \u0026nbsp;\n    \u003ca href=\"https://www.youtube.com/@CyberThreatDefence\"\u003e\u003cimg height=\"25\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/youtube.svg\" alt=\"YouTube\"\u003e\u003c/a\u003e\n    \u0026nbsp;\n    \u003ca href=\"https://cyberthreatdefence.com/my_awesome_lists\"\u003e\u003cimg height=\"20\" src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/blog.svg\" alt=\"My Awesome Lists\"\u003e\u003c/a\u003e\n    \u003cimg src=\"https://github.com/cybersecurity-dev/cybersecurity-dev/blob/main/assets/bar.gif\"\u003e\n\u003c/p\u003e\n\n## 📖 Contents\n- [OS based Reverse Engineering](#os-based-reverse-engineering)\n- [Execution based Reverse Engineering](#execution-based-reverse-engineering)\n- [Tools](#tools)\n- [My Other Awesome Lists](#my-other-awesome-lists)\n- [Contributing](#contributing)\n- [Contributors](#contributors)\n\n## [OS](https://en.wikipedia.org/wiki/Operating_system) based [Reverse Engineering](https://en.wikipedia.org/wiki/Reverse_engineering)\n- [![Android](https://img.shields.io/badge/Android-3DDC84?logo=android\u0026logoColor=white)](https://github.com/cybersecurity-dev/awesome-android-reverse-engineering) Reverse Engineering awesome list in [here](https://github.com/cybersecurity-dev/awesome-android-reverse-engineering).\n- [![Linux](https://img.shields.io/badge/Linux-FCC624?logo=linux\u0026logoColor=black)](https://github.com/cybersecurity-dev/awesome-linux-reverse-engineering) Reverse Engineering awesome list in [here](https://github.com/cybersecurity-dev/awesome-linux-reverse-engineering).\n- [![Windows](https://custom-icon-badges.demolab.com/badge/Windows-0078D6?logo=windows11\u0026logoColor=white)](https://github.com/cybersecurity-dev/awesome-windows-reverse-engineering) Reverse Engineering awesome list in [here](https://github.com/cybersecurity-dev/awesome-windows-reverse-engineering).\n\n## [Execution](https://en.wikipedia.org/wiki/Execution_(computing)) based [Reverse Engineering](https://en.wikipedia.org/wiki/Reverse_engineering)\n- Static reverse engineering\n    - [Disassembler](#disassembler),\n    - [Decompiler](#decompiler),\n    - Hex Editors,\n    - String Extractors\n- Dynamic reverse engineering\n    - Debugger\n    - Sandboxing Tools\n    - Memory Analysis Tools\n    - Profilers\n## Tools\n\n### Disassembler\n- [IDA Pro](https://hex-rays.com/ida-pro) - A powerful disassembler, decompiler and a versatile debugger.\n- [Ghidra](https://github.com/NationalSecurityAgency/ghidra) - [Ghidra](www.nsa.gov/ghidra) is a software reverse engineering (SRE) framework.\n- [objdump](https://en.wikipedia.org/wiki/Objdump) - objdump is a command-line program for displaying various information about object files on Unix-like operating systems.\n\n### Decompiler\n- [RetDec](https://github.com/avast/retdec) - [RetDec](https://retdec.com/) is a retargetable machine-code decompiler based on LLVM.\n- [Snowman](https://github.com/x64dbg/snowman) - Snowman Decompiler for x64dbg.\n\n### Hex Editors\n\n### String Extractors\n\n\n##\n### My Other Awesome Lists\nYou can access the my other awesome lists [here](https://cyberthreatdefence.com/my_awesome_lists)\n\n### Contributing\n\n[Contributions of any kind welcome, just follow the guidelines](contributing.md)!\n\n### Contributors\n\n[Thanks goes to these contributors](https://github.com/cybersecurity-dev/awesome-reverse-engineering/graphs/contributors)!\n\n[🔼 Back to top](#awesome-reverse-engineering-)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Fawesome-reverse-engineering","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcybersecurity-dev%2Fawesome-reverse-engineering","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurity-dev%2Fawesome-reverse-engineering/lists"}