PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games. However, it can be used for any reverse-engineering related stuff. PINCE is an abbreviation for 'PINCE is not Cheat Engine'. PINCE is in development right now, read Features part of the project to see what is done and Roadmap part to see what is currently planned. Also, please read Wiki Page of the project to understand how PINCE works. Feel free to join our discord server! Disclaimer: Do not trust to any source other than Trusted Sources that claims to have the source code or package for PINCE and remember to report them immediately Disclaimer: YOU are responsible for your actions. PINCE does NOT take any responsibility for the damage caused by the users Pre-release screenshots: Features Memory searching: PINCE uses a specialized fork of libscanmem to search the memory efficiently Background Execution: PINCE uses background execution by default, allowing users to run GDB commands while process is running Variable Inspection&Modification CheatEngine-like value type support: Currently supports all types of CE and scanmem along with extended strings(utf-8, utf-16, utf-32) Symbol
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A .NET assembly debugger and editor that enables reverse engineering and dynamic analysis of compiled .NET applications without source code access.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
Code to prevent a managed .NET debugger/profiler from working.
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.