An open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the source code for. There are many features available and a comprehensive plugin system to add your own. You can find more information on the blog! Screenshots Installation & Usage Download a snapshot from GitHub, SourceForge or OSDN and extract it in a location your user has write access to. Optionally use x96dbg.exe to register a shell extension and add shortcuts to your desktop. You can now run x32\x32dbg.exe if you want to debug a 32-bit executable or x64\x64dbg.exe to debug a 64-bit executable! If you are unsure you can always run x96dbg.exe and choose your architecture there. You can also compile x64dbg yourself with a few easy steps! Sponsors Contributing This is a community effort and we accept pull requests! See the CONTRIBUTING document for more information. If you have any questions you can always contact us or open an issue. You can take a look at the good first issues to get started. Credits Debugger core by TitanEngine Community Edition Disassembly powered by Zydis Assembly powered by XEDParse and asmjit Import reconstruction powered by...
Common questions about x64dbg including features, pricing, alternatives, and user reviews.
x64dbg is An open-source binary debugger for Windows with a comprehensive plugin system for malware analysis and reverse engineering. It is a Security Operations solution designed to help security teams with Reverse Engineering, Binary Analysis.
Agentic AI tool for automated malware reverse engineering & phishing analysis.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
Binwalk is a firmware analysis tool that enables reverse engineering and extraction of embedded file systems and archives from firmware images.