Medusa - Disassembler!

You will need version 4 or higher of `firefox` https://www.mozilla.org/firefox
to run Pencil as a Firefox Extension. Linux users will need version 4 or higher of either `firefox`, `iceweasel` or `xulrunner` https://developer.mozilla.org/en-US/docs/Mozilla/Projects/XULRunner,
or version 25 or higher of `palemoon` https://www.palemoon.org/.
The Windows installer and OS X archive has everything you need built-in. Windows, Linux, OS X & Firefox Packages are available for download from the Releases Page https://github.com/prikhi/pencil/releases.
You can also install the Firefox Add-on from the Mozilla Add-on Repository https://addons.mozilla.org/en-US/firefox/addon/pencil-prototyping/.
To install the OS X package, unzip the archive and copy the `Pencil.app` folder t

Medusa - Disassembler alternatives

  • OllyDbg

  • OllyDbg is a 32-bit assembler level analysing debugger. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable.

    tags: assembler debugger reverse-engineering
  • GNU Project Debugger

  • GNU Project Debugger, or gdb, is a command-line, source-level debugger for programs that were written in C, C++, D, Objective-C, Fortran, Java, Pascal, assembly, Modula-2, or Ada and compiled for any of a number of different target architectures including x86, x86-64, IA-64, Alpha, ARM, Motorola 68000, MIPS, PowerPC, SPARC, and others. gdb supports hardware breakpoints, conditions, core dump analysis, expression evaluation, remote debugging, stepping into/out of code, disassembling, and, in some cases, reversible debugging. ยป

    tags: alpha arm assembly breakpoint coff
  • Bokken

  • Bokken is a GUI for the Pyew and Radare projects so it offers almost all the same features that Pyew has and and some of the Radare's ones. It's intended to be a basic disassembler, mainly, to analyze malware and vulnerabilities.

    tags: debugger decompiling reverse-engineering
  • ArkDasm

  • ArkDasm is a 64-bit interactive disassembler and debugger for Windows.

    tags: assembler binary-viewer decompiling executable-viewer machine-code
  • PEBrowseDbg64 Interactive

  • A very powerful, versatile, and customizable Win32/Win64 user mode debugger/disassembler. PEBrowseDbg64 Interactive is not a source code debugger, but operates at the Intel x64 instruction level and therefore at the lowest level where your program executes. The debugger fully supports Microsoft .NET managed processes and seamlessly allows interop or mixed-mode debugging. It also supports debugging child processes.

    tags: debugger reverse-engineering