Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
-
Updated
Aug 7, 2025 - Python
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Reverse engineering framework in Python
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
Reverse engineering tool for linux games
RetroWrite -- Retrofitting compiler passes through binary rewriting
BeaEngine disasm project
Security Analysis tool for WebAssembly module (wasm) and Blockchain Smart Contracts (BTC/ETH/NEO/EOS)
SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also contains its own custom disassembler, with many innovative features, such as being able to show the deobfuscated disassembly of an encoded shellcode, or integrating emulation data to enhance the disassembly.
Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
Unity IL2CPP Disassembler (for apk)
Python cross-version bytecode library and disassembler
Ghidra Analysis Enhancer 🐉
Cairo/Starknet security toolkit (bytecode analyzer, disassembler, decompiler, symbolic execution, SBMC)
SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.
An ethereum evm bytecode disassembler and static/dynamic analysis tool
A suite of tools for creating disassemblies of ZX Spectrum games.
Add a description, image, and links to the disassembler topic page so that developers can more easily learn about it.
To associate your repository with the disassembler topic, visit your repo's landing page and select "manage topics."