![]() ![]() Personally, I roll with Olly, WinDbg & W32Dasm, and some smaller utility tools.Īlso, remember that disassembling or even debugging other people's software is usually against the EULA in the very least :) You can read about malware analysis with VMware here. In the case of SICE, it will protect your actual system from BSODs, and in the case of malware, it will protect your actual system from the target program. Some related tools that might come handy in whatever it is you're doing are resource editors such as ResourceHacker (free) and a good hex editor such as Hex Workshop (commercial).Īdditionally, if you are doing malware analysis (or use SICE), I wholeheartedly suggest running everything inside a virtual machine, namely VMware Workstation. Produces great results but costs a big buck, and won't be sold to just anyone (or so I hear). ![]() C: HexRays, commercial, a plugin for IDA Pro by the same company.Delphi: DeDe, free, produces good quality source code.Visual Basic: VB Decompiler, commercial, produces somewhat identifiable bytecode.You'll have to look around to find the best version. ![]() I believe W32Dasm is abandonware these days, and there are numerous user-created hacks to add some very useful functionality.
0 Comments
Leave a Reply. |