Tag Archives: reverse engineering

Exeinfo PE – Executable files’ packer/compressor/compiler detector

Exeinfo PE – Executable files' packer/compressor/compiler detector

Exeinfo PE is a popular and universal free analyzer & detector to executable files' packer/compressor/compiler, written in Delphi by A.S.L from Poland. It is capable of detecting 300+ binary data types (non EXE formats and more signatures on Ext_detector.dll) with info about how to open them via some free tool.

[v1.99 R6] PE Explorer – Most popular 32-bit PE files resource editor

PE Explorer is an extremely powerful visual resource editor for 32-bit executable files (including EXE, DLL, DRV, BPL, DPL, SYS, CPL, OCX, SCR, etc.). It enables you to directly view, modify all kinds of resources in these files, which include menus, dialog boxes, strings, and so forth.

Java Decompiler – Fast access, browse source code of Java .class file

Java Decompiler – Fast access, browse source code of Java .class file

Decompiler and disassembler are essential tools for any sharp-sighted programmers. No matter which programming languages, they have their corresponding decompilers. For compiled Java binary class file, there are two excellent decompilers: they are freeware Java Decompiler and commercial software DJ Java Decompiler (AppNee will release its related resources later).

OllyDbg + 0llyICE – Most popular 32-bit & 64-bit disassembler and assembler

OllyDbg is a professional 32-bit assembler-level analyzing debugger from Germany, written for both Windows 32-bit and 64-bit, released and kept as freeware. As is known to all, it is really an edge tool for software cracking, and a must-have tool for many novices.

Cyborg Linux – More advanced, beautiful and poweful than Kali Linux

Cyborg Linux – More advanced, beautiful and poweful than Kali Linux

Cyborg Linux (AKA: Cyborg Hawk) is a Ubuntu (currently the most popular Unix-like OS) based penetration testing Linux distro, specially designed for hackers or cyber security experts to perform all kinds of network security penetration testing, assessment, computer forensics and more.