- IDA - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger that offers so many features it is hard to describe them all. Just grab an evaluation version if you want a test drive.
- Ghidra - Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. Windows, Mac OS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of process instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python.
- radare2 - Radare2 is an open source tool to disassemble, debug, analyze and manipulate binary files. It actually supports many architectures (x86{16,32,64}, Dalvik, avr, ARM, java, PowerPC, Sparc, MIPS) and several binary formats (pe{32,64}, [fat]mach0{32,64}, ELF{32,64}, dex and Java classes), apart from support for filesystem images and many more features. It runs on the command line, but it has a graphical interface called Cutter that has support for some of its features already.
- Binary Ninja - Binary Ninja is a reverse engineering platform. It focuses on a clean and easy to use interface with a powerful multithreaded analysis built on a custom IL to quickly adapt to a variety of architectures, platforms, and compilers. Runs on macOS, Windows, and Linux.
- Hopper - Hopper is a reverse engineering tool for macOS and Linux, that lets you disassemble, decompile and debug (OS X only) your 32/64bits Intel Mac, Windows and iOS (ARM) executables.
- x64dbg - An open-source x64/x32 debugger for windows.
- ImmunityDbg - Immunity Debugger is a branch of OllyDbg v1.10, with built-in support for Python scripting and much more.
- PE Explorer's disassembler - The PE Explorer Disassembler is designed to be easy to use compared with other disassemblers. To that end, some of the functionality found in other products has been left out in order to keep the process simple and fast. While as powerful as the more expensive, dedicated disassemblers, PE Explorer focuses on ease of use, clarity and navigation.
- Hiew - Hiew is a great disassembler designed for hackers, as the name suggests. It supports three modes - Text, Hexadecimal and Decode (Dis-assembly) mode.
- ODA - The Online Disassembler is a free web-based, reverse engineering platform that supports over 60 architectures and object file formats from all the major operating systems, including Windows, Mac OS X, Linux, and mobile platforms.
- Relyze - Relyze is a commercial interactive disassembler for x86, x64 and ARM software with loaders for PE or ELF file formats. It supports interactive flat and graph views of the disassembly, generating call and reference graphs, binary diffing two executables, exploring the executable file's structure and a Ruby plugin API. It can also handle things like symbols (PDB's), function local variables, switch statements, exception handlers, static library identification and more.
- Medusa - Medusa is an open source disassembler with x86, x64, z80 and partial ARM support. It runs on Windows and Linux. It has interactive flat and graph views.
- W32Dasm - W32DASM was an excellent 16/32 bit disassembler for Windows, it seems it is no longer developed. the latest version available is from 2003
- Capstone - Capstone is a lightweight multi-platform, multi-architecture disassembly framework.
- BORG Disassembler - BORG is an excellent Win32 Disassembler with GUI.
- DSM Studio Disassembler - DSM Studio is an easy-to-use yet comprehensive application that can aid you in the disassembly and inspection of executables built for the Intel x86 architecture.
- Decompiler - Decompiler is an easy to use and simply application designed to read program binaries and decompile executable or DLL files. The application is designed to decompile executables for any processor architecture and not be tied to a particular instruction set. Although currently only a x86 front end is implemented, there is nothing preventing you from implementing a 68K, Sparc, or VAX front end if you need one.
- Lida - linux interactive disassembler - lida is a fast feature packed interactive ELF disassembler / code-/cryptoanalyzer based on bastards libdisasm
- BugDbg x64 v0.7.5 - BugDbg x64 is a user-land debugger designed to debug native 64-bit applications. BugDbg is released as Freeware.
- distorm3 - A lightweight, Easy-to-Use and Fast Disassembler/Decomposer Library for x86/AMD64
- Udis86 - Udis86 is an easy-to-use, minimalistic disassembler library (libudis86) for the x86 class of instruction set architectures. It has a convenient interface for use in the analysis and instrumentation of binary code.
- BeaEngine - This project is a package with a multi-platform x86 and x64 disassembler library (Solaris, MAC OSX, AIX, Irix, OS/2, Linux, Windows)
- C4 Decompiler - General Machine Code to C Decompiler, Free Windows I64 target edition, Interactive Windows GUI
- REC Studio 4 - Reverse Engineering Compiler - REC Studio is an interactive decompiler. It reads a Windows, Linux, Mac OS X or raw executable file, and attempts to produce a C-like representation of the code and data used to build the executable file. It has been designed to read files produced for many different targets, and it has been compiled on several host systems.
- Retargetable Decompiler - A retargetable decompiler that can be utilized for source code recovery, static malware analysis, etc. The decompiler is supposed to be not bounded to any particular target architecture, operating system, or executable file format.
- miasm - Miasm is a a free and open source (GPLv2) reverse engineering framework written in python. Miasm aims at analyzing/modifying/generating binary programs.
- Free Code Manipulation Library - This is a general purpose machine code manipulation library for IA-32 and Intel 64 architectures. The library supports UNIX-like systems as well as Windows and is highly portable.
- Intel® X86 Encoder Decoder Software Library - Intel® XED is a software library (and associated headers) for encoding and decoding X86 (IA32 and Intel64) instructions.
- angr - angr is a framework for analyzing binaries. It focuses on both static and dynamic symbolic ("concolic") analysis, making it applicable to a variety of tasks.
- JEB Decompiler - JEB is a reverse-engineering platform to perform disassembly, decompilation, debugging, and analysis of code and document files, manually or as part of an analysis pipeline.
- Cutter - A Qt and C++ GUI for radare2 reverse engineering framework (originally Iaito). Cutter is not aimed at existing radare2 users. It instead focuses on those whose are not yet radare2 users because of the learning curve, because they don't like CLI applications or because of the difficulty/instability of radare2.
- REDasm - REDasm is an interactive, multiarchitecture disassembler written in C++ using Qt5 as UI Framework. Its core is light and simple, it can be extended in order to support new instruction sets and file formats.
- CeWL - Custom Word List generator | github
- Nmap: the Network Mapper - Free Security Scanner
- p0f - passive TCP/IP stack fingerprinting tool
- cURL
- OnlineGDB - online compiler and debugger for c/c++
- Jump instructions
- Shademap - Simulator of a shade
- how to find a location using only the shadow
- Weakpass - Weakpass.com is a collection of password lists for various purposes from penetration testing to improving password security.
- evilginx2
- Modlishka. Reverse Proxy. Phishing NG.
- hasherezade
- Windows Exploit Suggester
- Ghidra - software reverse engineering framework
- Is website vulnerable - finds publicly known security vulnerabilities in a website's frontend JavaScript libraries
- Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
- hasherezade
- Awesome Bug Bounty
- PL - Adam Kostrzewa - Blog about Security and Embedded Design
- DARKNET DIARIES - True stories from the dark side of the Internet. This is a podcast about hackers, breaches, APTs, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network. This is Darknet Diaries.
- PL/Youtube - Od 0 do pentestera
- Security and Docker: tips and tricks
- Kali Linux Penetration Testing Tools
- Cracking PDF with John the Ripper
- Programming languages infosec professionals should learn
- How I hacked Google’s bug tracking system itself for $15,600 in bounties
- CTF Resources
- Input validation
- Linux Reverse Engineering CTFs for Beginners
- A good general CTF guide
- $50 million CTF Writeup
- How does Dalvik handle 'this' registers?
- Registers in Dalvik
- Android Reverse Engineering: Debugging Smali in Smalidea
- Dalvik bytecode
- How to capture Bluetooth packets on Android 4.4
- XPrivacyLua - Really simple to use privacy manager for Android 6.0 Marshmallow and later
- Privacy tools - List of privacy tools