PINCE Logo

PINCE

0
Free
Visit Website

PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games. However, it can be used for any reverse-engineering related stuff. PINCE is an abbreviation for 'PINCE is not Cheat Engine'. PINCE is in development right now, read Features part of the project to see what is done and Roadmap part to see what is currently planned. Also, please read Wiki Page of the project to understand how PINCE works. Feel free to join our discord server! Disclaimer: Do not trust to any source other than Trusted Sources that claims to have the source code or package for PINCE and remember to report them immediately Disclaimer: YOU are responsible for your actions. PINCE does NOT take any responsibility for the damage caused by the users Pre-release screenshots: Features Memory searching: PINCE uses a specialized fork of libscanmem to search the memory efficiently Background Execution: PINCE uses background execution by default, allowing users to run GDB commands while process is running Variable Inspection&Modification CheatEngine-like value type support: Currently supports all types of CE and scanmem along with extended strings(utf-8, utf-16, utf-32) Symbol

FEATURES

ALTERNATIVES

A collection of Yara rules for detecting malware evasion techniques

A de-obfuscator for M/o/Vfuscator, a notorious obfuscator, designed to reverse the effects of M/o/Vfuscator's obfuscation.

Standalone graphical utility for viewing Java source codes from ".class" files.

Cybersecurity tool merging DarunGrim's analysis algorithms, currently in internal testing for official release.

A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

A Burp plugin for identifying potential vulnerabilities in web applications

KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.

A blind SQL injection tool written in Golang