x64dbg Logo

x64dbg

0
Free
Visit Website

An open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the source code for. There are many features available and a comprehensive plugin system to add your own. You can find more information on the blog! Screenshots Installation & Usage Download a snapshot from GitHub, SourceForge or OSDN and extract it in a location your user has write access to. Optionally use x96dbg.exe to register a shell extension and add shortcuts to your desktop. You can now run x32\x32dbg.exe if you want to debug a 32-bit executable or x64\x64dbg.exe to debug a 64-bit executable! If you are unsure you can always run x96dbg.exe and choose your architecture there. You can also compile x64dbg yourself with a few easy steps! Sponsors Contributing This is a community effort and we accept pull requests! See the CONTRIBUTING document for more information. If you have any questions you can always contact us or open an issue. You can take a look at the good first issues to get started. Credits Debugger core by TitanEngine Community Edition Disassembly powered by Zydis Assembly powered by XEDParse and asmjit Import reconstruction powered by...

FEATURES

ALTERNATIVES

Automatic YARA rule generation for malware repositories.

A backend agnostic debugger frontend for debugging binaries without source code access.

A Burp intruder extender for automating and validating XSS vulnerabilities

Fuzzilli is a JavaScript engine fuzzer that helps identify vulnerabilities in JavaScript engines.

KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.

A web-based manager for Yara rules, allowing for storage, editing, and management of Yara rules.

A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

Checksec is a bash script to check the properties of executables like PIE, RELRO, Canaries, ASLR, Fortify Source.