Search results
Results from the WOW.Com Content Network
Noesis is software for viewing, converting, and reverse engineering data. Common data types supported by the software include images, 3D models, medical imaging , and animation. [1] Noesis was created and is actively maintained by video game programmer Rich Whitehouse.
Radare2 was created in February 2006, [3] aiming to provide a free and simple command-line interface for a hexadecimal editor supporting 64 bit offsets to make searches and recovering data from hard-disks, for forensic purposes.
Ghidra (pronounced GEE-druh; [3] / ˈ ɡ iː d r ə / [4]) is a free and open source reverse engineering tool developed by the National Security Agency (NSA) of the United States. The binaries were released at RSA Conference in March 2019; the sources were published one month later on GitHub. [5]
Binary Ninja is a reverse-engineering platform developed by Vector 35 Inc. [1] It allows users to disassemble a binary file and visualize the disassembly in both linear and graph-based views. The software performs automated, in-depth code analysis, generating information that helps to analyze a binary.
Power engineering software - software for power stations, overhead power lines, transmission towers, electrical grids, grounding, electrical substations, and Lightning List of discrete event simulation software - Discrete-event simulation
Rigi is an interactive graph editor tool for software reverse engineering using the white box method, i.e. necessitating source code, [1] [2]: 88 thus it is mainly aimed at program comprehension. [ 3 ] : 99 Rigi is distributed by its main author, Hausi A. Müller and the Rigi research group at the University of Victoria .
In late 2019, a crack developed by CODEX for Need for Speed: Heat, which uses Denuvo DRM, was leaked online, likely through their network of testers. Normally, the final cracks published by CODEX made use of anti-debugging tools like VMProtect or Themida, to impede reverse engineering efforts. This unfinished crack was not similarly protected.
In most cases a clone is made in part by studying and reverse engineering the original executable, but occasionally, as was the case with some of the engines in ScummVM, the original developers have helped the projects by supplying the original source code—those are so-called source ports.