https://github.com/cybersecurity-dev/awesome-reverse-engineering
Awesome Reverse Engineering
https://github.com/cybersecurity-dev/awesome-reverse-engineering
List: awesome-reverse-engineering
android-reverse-engineering linux-reverse-engineering reverse-engineering reverseengineering windows-reverse-engineering
Last synced: 5 days ago
JSON representation
Awesome Reverse Engineering
- Host: GitHub
- URL: https://github.com/cybersecurity-dev/awesome-reverse-engineering
- Owner: cybersecurity-dev
- License: cc0-1.0
- Created: 2025-08-02T22:04:08.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2025-09-14T10:53:41.000Z (5 months ago)
- Last Synced: 2025-09-14T12:31:42.441Z (5 months ago)
- Topics: android-reverse-engineering, linux-reverse-engineering, reverse-engineering, reverseengineering, windows-reverse-engineering
- Homepage: https://cyberthreatdefence.com/
- Size: 17.6 KB
- Stars: 2
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# **`Awesome`** [Reverse](https://wikipedia.org/wiki/Static_program_analysis) [Engineering](https://wikipedia.org/wiki/Dynamic_program_analysis) [](https://awesome.re)
[](https://github.com/cybersecurity-dev/awesome-android-reverse-engineering)
[](https://github.com/cybersecurity-dev/awesome-linux-reverse-engineering)
[](https://github.com/cybersecurity-dev/awesome-windows-reverse-engineering)
[](https://www.reddit.com/r/ReverseEngineering/)
## 📖 Contents
- [OS based Reverse Engineering](#os-based-reverse-engineering)
- [Execution based Reverse Engineering](#execution-based-reverse-engineering)
- [Tools](#tools)
- [My Other Awesome Lists](#my-other-awesome-lists)
- [Contributing](#contributing)
- [Contributors](#contributors)
## [OS](https://en.wikipedia.org/wiki/Operating_system) based [Reverse Engineering](https://en.wikipedia.org/wiki/Reverse_engineering)
- [](https://github.com/cybersecurity-dev/awesome-android-reverse-engineering) Reverse Engineering awesome list in [here](https://github.com/cybersecurity-dev/awesome-android-reverse-engineering).
- [](https://github.com/cybersecurity-dev/awesome-linux-reverse-engineering) Reverse Engineering awesome list in [here](https://github.com/cybersecurity-dev/awesome-linux-reverse-engineering).
- [](https://github.com/cybersecurity-dev/awesome-windows-reverse-engineering) Reverse Engineering awesome list in [here](https://github.com/cybersecurity-dev/awesome-windows-reverse-engineering).
## [Execution](https://en.wikipedia.org/wiki/Execution_(computing)) based [Reverse Engineering](https://en.wikipedia.org/wiki/Reverse_engineering)
- Static reverse engineering
- [Disassembler](#disassembler),
- [Decompiler](#decompiler),
- Hex Editors,
- String Extractors
- Dynamic reverse engineering
- Debugger
- Sandboxing Tools
- Memory Analysis Tools
- Profilers
## Tools
### Disassembler
- [IDA Pro](https://hex-rays.com/ida-pro) - A powerful disassembler, decompiler and a versatile debugger.
- [Ghidra](https://github.com/NationalSecurityAgency/ghidra) - [Ghidra](www.nsa.gov/ghidra) is a software reverse engineering (SRE) framework.
- [objdump](https://en.wikipedia.org/wiki/Objdump) - objdump is a command-line program for displaying various information about object files on Unix-like operating systems.
### Decompiler
- [RetDec](https://github.com/avast/retdec) - [RetDec](https://retdec.com/) is a retargetable machine-code decompiler based on LLVM.
- [Snowman](https://github.com/x64dbg/snowman) - Snowman Decompiler for x64dbg.
### Hex Editors
### String Extractors
##
### My Other Awesome Lists
You can access the my other awesome lists [here](https://cyberthreatdefence.com/my_awesome_lists)
### Contributing
[Contributions of any kind welcome, just follow the guidelines](contributing.md)!
### Contributors
[Thanks goes to these contributors](https://github.com/cybersecurity-dev/awesome-reverse-engineering/graphs/contributors)!
[🔼 Back to top](#awesome-reverse-engineering-)