x64_dbg is a 32-bit and 64-bit assembler level debugger for Windows.
tags: 64-bit-support debugger decompiling reverse-engineering static-analysisThe IDA Pro Disassembler and debugger is a multi-processor disassembler and debugger hosted on the Windows, Linux and Mac OS X Platforms.
tags: debugger decompiling reverse-engineeringImmunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industrys first heap analysis tool built specifically for heap creation, and a large and well supported Python API for easy extensibility.
tags: debugger reverse-engineeringBinary Ninja : A Reverse Engineering Platform
tags: assembly hacking hex-editor powerpc reverse-engineeringWinDbg is a multipurposed debugger for Microsoft Windows, distributed on the web by Microsoft as part of the Debugging Tools for Windows. It can be used to debug user mode applications, drivers, and the operating system itself in kernel mode. It is a GUI application, but has little in common with the more well-known, but less powerful, Visual Studio Debugger.
tags: debuggerBokken is a GUI for the Pyew and Radare projects so it offers almost all the same features that Pyew has and and some of the Radare's ones. It's intended to be a basic disassembler, mainly, to analyze malware and vulnerabilities.
tags: debugger decompiling reverse-engineeringA general, open source, retargetable decompiler of machine code programs
tags: decompiling reverse-engineeringArkDasm is a 64-bit interactive disassembler and debugger for Windows.
tags: assembler binary-viewer decompiling executable-viewer machine-codeODA is an online disassembler for a wide range of machine architectures, including: Alpha, ARM, AVR, Intel x86, Motorola 68000, MIPS, PDP-11, PowerPC, SPARC, Z80, and more! Upload a Windows PE file, ELF, or raw binary and then view the disassembly and object file meta date such as symbols and sections.
tags: decompiling reverse-engineeringMedusa is a disassembler designed to be both modular and interactive. It runs on Windows and Linux, it should be the same on OSX. This project is organized as a library. To disassemble a file you have to use medusa_text or qMedusa.
tags: decompilingA very powerful, versatile, and customizable Win32/Win64 user mode debugger/disassembler. PEBrowseDbg64 Interactive is not a source code debugger, but operates at the Intel x64 instruction level and therefore at the lowest level where your program executes. The debugger fully supports Microsoft .NET managed processes and seamlessly allows interop or mixed-mode debugging. It also supports debugging child processes.
tags: debugger reverse-engineering