Search results
Results from the WOW.Com Content Network
x64dbg is a free and open-source [1] debugging software available on Windows-based systems.It is used to analyze 64-bit executable files, while its counterpart, x32dbg, is used to analyze 32-bit executable files.
Turbo Debugger — Pascal/C/assembly debugger for DOS; Undo LiveRecorder — C, C++, Go, Rust, Java time travel debugger; Ups — C, Fortran source level debugger; Valgrind — Valgrind is a programming tool for memory debugging, memory leak detection, and profiling. VB Watch — debugger for Visual Basic 6.0; Visual Studio Debugger ...
The Interactive Disassembler (IDA) is a disassembler for computer software which generates assembly language source code from machine-executable code. It supports a variety of executable formats for different processors and operating systems. It can also be used as a debugger for Windows PE, Mac OS X Mach-O, and Linux ELF executables.
SASM (short for SimpleASM) is a free and open source cross-platform integrated development environment for the NASM, MASM, GAS and FASM assembly languages. It features syntax highlighting and includes a debugger. [1] SASM is intended to allow users to easily develop and run programs written in assembly language.
The line-oriented debugger DEBUG.EXE is an external command in operating systems such as DOS, OS/2 and Windows (only in 16-bit/32-bit versions [1]).. DEBUG can act as an assembler, disassembler, or hex dump program allowing users to interactively examine memory contents (in assembly language, hexadecimal or ASCII), make changes, and selectively execute COM, EXE and other file types.
Visual Studio Debugger: 1995 Debugger in Microsoft Visual Studio: C++, JavaScript, .net languages Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2[4], Windows 10, Windows Server 2016 Yes, Yes Proprietary: March 7, 2017 XPEDITER: 1980? family of mainframe debuggers COBOL, PL/1 & Assembler: z/OS
Turbo Debugger (TD) is a machine-level debugger for DOS executables, intended mainly for debugging Borland Turbo Pascal, and later Turbo C programs, sold by Borland.It is a full-screen debugger displaying both Turbo Pascal or Turbo C source and corresponding assembly-language instructions, with powerful capabilities for setting breakpoints, watching the execution of instructions, monitoring ...
Ghidra (pronounced GEE-druh; [3] / ˈ ɡ iː d r ə / [4]) is a free and open source reverse engineering tool developed by the National Security Agency (NSA) of the United States. The binaries were released at RSA Conference in March 2019; the sources were published one month later on GitHub. [5]