Viper
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
AndBug is a debugger targeting the Android platform's Dalvik virtual machine intended for reverse engineers and developers. It uses the same interfaces as Android's Eclipse debugging plugin, the Java Debug Wire Protocol (JDWP) and Dalvik Debug Monitor (DDM) to permit users to hook Dalvik methods, examine process state, and even perform changes. Unlike Google's own Android Software Development Kit debugging tools, AndBug does not require or expect source code. It does, however, require that you have some level of comfort with Python, as it uses a concept of scripted breakpoints, called 'hooks', for most nontrivial tasks. If you just want to dump loaded classes, methods, or threads, there are example scripts for that. AndBug is very much a program in flux, as I separate one-off scripts I have written at IOActive for various tasks from customer and IOActive-proprietary contexts. I do not recommend installation at this time, as you will want to update it frequently afterwards. AndBug runs very nicely from its own source directory with very little setup. Install the Android Software Development Kit.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.
A multithreaded YARA scanner for incident response or malware zoos.
A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.
A command-line utility for examining Objective-C runtime information in Mach-O files and generating class declarations.
Tplmap is a tool for detecting and exploiting server-side template injection vulnerabilities.