HexFiend
cutter
HexFiend | cutter | |
---|---|---|
10 | 39 | |
5,198 | 15,136 | |
1.2% | 2.0% | |
9.1 | 8.2 | |
about 2 months ago | 2 days ago | |
Objective-C | C++ | |
BSD 2-clause "Simplified" License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
HexFiend
- Reverse-engineering an encrypted IoT protocol
-
The Hiew Hex Editor
For macOS users, there's also native app Hex Fiend (open source) which also has a pattern language.
https://hexfiend.com
-
GNU poke: The extensible editor for structured binary data
* HexFiend - a hex editor, but with "binary templates" feature : https://github.com/HexFiend/HexFiend
-
Garbage display fix in FHD screens
First we need to download these three Applications: Hackintool, AWEDIDEditor and HexFiend
-
What is the best hex-editor in 2022
For MacOS, I use HexFiend. It has TCL-based binary templates (fairly easy to write) and a CLI launcher (hexf)
https://hexfiend.com
https://github.com/HexFiend/HexFiend
-
Patching an Embedded Synthesiser OS from 1996 with Ghidra
Shout out to Hex Fiend! My favorite feature is the template system[0]. It makes it much easier to figure out file formats for which you have no documentation. You write a little tcl code to describe the parts of the format you understand as you go.
[0] https://github.com/HexFiend/HexFiend/tree/master/templates
- Fq: Jq for Binary Formats
-
Firefox's Optimized Zip Format: Reading Zip Files Quickly
I recently made a visualization template of ZIP file contents for HexFiend. The format is certainly wonky, and some writers (I’m looking at you, macOS) don’t get it quite right: https://github.com/HexFiend/HexFiend/blob/master/templates/A...
-
Awesome Penetration Testing
Hex Fiend - Fast, open source, hex editor for macOS with support for viewing binary diffs.
-
Tweak: An Efficient Hex Editor
The topo sort means we'll write [100, 200) first, so its source data is not overwritten.
Here is Hex Fiend's B+tree: https://github.com/HexFiend/HexFiend/blob/master/framework/s...
cutter
-
The Hiew Hex Editor
Everything Hiew can do, Rizin[1] can do too, and is completely free and open source[2] under LGPL3 license. Moreover, it supports more architectures, platforms, and file formats, as well as GUI in Qt - Cutter[3][4]. If something is missing in Rizin but presented in Hiew, please let us know by opening the issue with details.
[1] https://rizin.re
[2] https://github.com/rizinorg/rizin
[3] https://cutter.re
[4] https://github.com/rizinorg/cutter
-
If you're interested in eye-tracking, I'm interested in funding you
Okay, so, your comment about a "Dasher + Guitar Hero music theory/improvisation practice program" just sent me down a huge rabbit hole...
Well, rabbit hole(s) plural, I guess, most not directly related. :D
Largely because I made the "mistake" of looking at your HN profile & discovering you're also in NZ & we seem to have somewhat overlapping interests (and an affinity for "bacon" in account names, apparently), so, some thoughts[0]... :)
# Topic 1: Nissan Leaf VSP hacking
After reading your recent posts (https://ianrrees.github.io//2023/07/03/vsp-hacking.html & https://ianrrees.github.io//2023/08/05/voltage-glitch-inject...) on this topic & noting your remark about wanting to try reverse engineering a firmware image, I found the following thesis PDF (via a brief google search for `"reverse engineer" "firmware" "Renesas"`):
* "AUTOMOTIVE FIRMWARE EXTRACTION AND ANALYSIS TECHNIQUES" by Jan Van den Herrewegen https://etheses.bham.ac.uk/id/eprint/11516/1/VandenHerrewege...
Not really what I was anticipating finding but seems relevant to your interests--I don't think it was already in your resource list.
While the thesis addresses the Renesas 78K0 rather than the Renesas 78K0R, from a brief look at the "Flash Protection" PDF Application Note in your resource list it seems there's a large overlap.
Perhaps most significantly the author presents "novel methods" that combine bootloader binary analysis with constraint-based power glitching in an effort to improve on the results described in "Shaping the Glitch".
While I haven't read the entire 186 pages :D they theorize that using their approach extracting 8kB firmware might only take ~10 hours.
And, most helpfully, they even published their source code under the GPL here: https://github.com/janvdherrewegen/bootl-attacks
So, an interesting adjacent read even if it turns out not to be directly applicable to your situation.
Given I have an interest in & a little experience with firmware reversing my original thought was to maybe provide some hopefully helpful references that more generically related to firmware reversing but more specific is good too, I guess. :)
In terms of reverse engineering tooling, I've used Rizin/Cutter/radare2 previously: https://rizin.re https://cutter.re
On the CAN tooling/info front, you might be interested in taking a look at my "Adequate CAN" list which I originally wrote-up for a client a couple years ago: https://gitlab.com/RancidBacon/adequate-can
Some other probably outdated reverse engineering tooling links of mine: https://web.archive.org/web/20200119074540/http://www.labrad...
In terms of how to approach RE, other than just "getting started & digging in" & learning by doing, I've sometimes found it informative to read other people's firmware reverse engineering write-ups to learn about potentially useful approaches/tools.
Anyway, hopefully some of this is helpful!
[0] I have a tendency to be a little... "verbose" and/or "thorough" (depending on one's POV :) ) so I'll probably split this over a couple of comments, in case I run out of steam while writing and for topic separation.
-
Veles – A new age tool for binary analysis
In Cutter[1][2] we have an idea to implement thes same feature[3] as a plugin, but our priorities lie elsewhere die to the lack of enough hands. Contributions are welcome.
[1] https://cutter.re
[2] https://github.com/rizinorg/cutter
[3] https://github.com/rizinorg/cutter-plugins/issues/3
- Debugger Ghidra Class
-
Fq: Jq for Binary Formats
For this kind of task, using low-level debugger tools is probably better. Rizin[1][2]/Cutter[3][4] could help. We also have GSoC participant this year who works hard on improving debuginfo and debugging support[5]. I personally also like Binary Ninja, they recently made their debugger stable enough[6].
[1] https://rizin.re/
[2] https://github.com/rizinorg/rizin
[3] https://cutter.re/
[4] https://github.com/rizinorg/cutter
[5] https://rizin.re/posts/gsoc-2023-announcement/
[5] https://binary.ninja/2023/05/03/3.4-finally-freed.html#debug...
- Cutter (Reverse Engineering Tool) v2.2.1
-
What is this?
Something like https://cutter.re/ or https://www.nirsoft.net/utils/dll_export_viewer.html Could possibly give you some insight. I guess the question though is, what are you trying to do with it?
- Cutter Release 2.2.0
-
Dis This: Disassemble Python code online
Rizin[1] (and therefore Cutter[2]) supports interactive disassembly and analysis (but not decompilation) of the Python bytecode[3][4]. Apart from that it also supports Java and Lua bytecode for different versions.
[1] https://rizin.re
[2] https://cutter.re
[3] https://github.com/rizinorg/rizin/tree/dev/librz/asm/arch/py...
[4] https://github.com/rizinorg/rizin/blob/dev/librz/analysis/p/...
-
Stuff like this is why everyone uses scripting languages these days, since the main value prop of high-level languages is their ability to reliably print backtraces.
cutter is quite nice though
What are some alternatives?
fq - jq for binary formats - tool, language and decoders for working with binary and text formats
ghidra - Ghidra is a software reverse engineering (SRE) framework
LOIC - Deprecated - Low Orbit Ion Cannon - An open source network stress tool, written in C#. Based on Praetox's LOIC project. USE ON YOUR OWN RISK. WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. IF YOU GET V& IT IS YOUR FAULT.
rz-ghidra - Deep ghidra decompiler and sleigh disassembler integration for rizin
Ciphey - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
rizin - UNIX-like reverse engineering framework and command-line toolset.
libdeflate - Heavily optimized library for DEFLATE/zlib/gzip compression and decompression
r2ghidra - Native Ghidra Decompiler for r2
Kaitai Struct - Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Nim / Perl / PHP / Python / Ruby
efiSeek - Ghidra analyzer for UEFI firmware.
json-logs - A tool to pretty-print JSON logs, like those from zap or logrus.
AppImageLauncher - Helper application for Linux distributions serving as a kind of "entry point" for running and integrating AppImages