Reverse Engineering is a process of reading the software’s binary code to find what the software can make the computer do. It is this code that the computer reads and obeys, not the source code. Though binary code is not easily read by humans, a representation in assembly-language mnemonics, as shown in a debugger, is exactly equivalent (on all but some very obscure theoretical points) to what the computer reads.
REVERSE ENGINEERING- SOFTWARE'S / TOOLS / UTILITIES
- Evans Debugger
- GDB GNU Debugger
- OllyDbg
- W32Dasm
- Immunity Debugger
- SoftICE
- IDA
- windbg
- Paimei
- pydasm
- mona
- Hiew
- Syser
- METASM
- Revelo
- wxhexeditor
- Okteta
- Rubus
- IDA Pro
- SwfScan
- Flasm
- BDASM Disassemblers
- DeDe Dessembler
- CFF Explorer
- Strace
- Simple Assembly Explorer
- Resource Hacker
- Turbo Assembler
- MASM32 Assembler