ImHex
cutter
Our great sponsors
ImHex | cutter | |
---|---|---|
46 | 39 | |
32,832 | 14,881 | |
- | 1.2% | |
9.9 | 8.2 | |
4 days ago | 8 days ago | |
C++ | C++ | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ImHex
-
Ask HN: What Underrated Open Source Project Deserves More Recognition?
ImHex
“A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.”
I actually used it not too long ago to inspect why a mp4 file wasn’t valid. The pattern language that they have is quite nice and having sections of the hex highlighted and being able to see what structures they represent and what data was on those structures was very useful!
-
Spectrum Analyser, a Sinclair ZX Spectrum reverse engineering tool
Just one note: Please use UI scaling; it's near impossible to read on a 150% 4k screen (much less on 100%). Unfortunately, young eyes don't last forever.
The UI looks very much like ImHex (https://imhex.werwolv.net/) is this a coincidence, or is it the standard ImGui look and feel?
I wish ImHex had a decompiler for Z80 as well, but this is much better.
-
Immediate Mode GUI Programming
I didn't use RemedyBG or Tracy, but I did try ImHex (https://github.com/WerWolv/ImHex) and it loaded 12% of the CPU because everything is being repainted 60 times per second. Heck, it even has an option to limit the FPS, which solves the CPU load a bit, but at the same time results in sluggish input because the event handling is tied to the drawing frequency.
So yes, the experience was not good, and I don't see what these tools would lose by using a proper GUI. I don't want every utility to drain my laptop battery like a decent video game.
ImGui is great if you already have a loop where everything is unconditionally redrawn every frame, but otherwise it's a really odd choice for an end-user application.
-
The Hiew Hex Editor
I now use ImHex after looking for years for a good one. It has a pattern language to provide highlighting.
- Parsing an Undocumented File Format
-
Dear ImGui: Bloat-free Graphical User interface with minimal dependencies
ImGui is brilliant. I can highly recommend this hex editor built using it: https://github.com/WerWolv/ImHex
-
[Tutorial] How to manually change FOV (SoC, CS, & CoP)
Download a hex editor such as ImHex and open it. I'd recommend downloading the portable version of whatever hex editor you are using if it's offered. That way you don't have to install the program and can instantly delete it off your drive when you're done.
-
What was your first open source contribution?
Probably https://github.com/WerWolv/ImHex/pull/509
-
Visual IDE research feedback
"It seems from reading the post that the scope of the project is already way too large. This a decades-long project (for a single dev). But most (maybe all) of what's being offered already exists." My googling shows them existing as singular (or a few) features but not in a cohesive package; the "closest" one I could find is https://github.com/WerWolv/ImHex.
-
Hexyl: A command-line hex viewer
If you want a true Hex Editor (or better, Hex IDE), I strongly suggest you to take a look ad ImHex [1].
cutter
-
The Hiew Hex Editor
Everything Hiew can do, Rizin[1] can do too, and is completely free and open source[2] under LGPL3 license. Moreover, it supports more architectures, platforms, and file formats, as well as GUI in Qt - Cutter[3][4]. If something is missing in Rizin but presented in Hiew, please let us know by opening the issue with details.
[1] https://rizin.re
-
If you're interested in eye-tracking, I'm interested in funding you
Okay, so, your comment about a "Dasher + Guitar Hero music theory/improvisation practice program" just sent me down a huge rabbit hole...
Well, rabbit hole(s) plural, I guess, most not directly related. :D
Largely because I made the "mistake" of looking at your HN profile & discovering you're also in NZ & we seem to have somewhat overlapping interests (and an affinity for "bacon" in account names, apparently), so, some thoughts[0]... :)
# Topic 1: Nissan Leaf VSP hacking
After reading your recent posts (https://ianrrees.github.io//2023/07/03/vsp-hacking.html & https://ianrrees.github.io//2023/08/05/voltage-glitch-inject...) on this topic & noting your remark about wanting to try reverse engineering a firmware image, I found the following thesis PDF (via a brief google search for `"reverse engineer" "firmware" "Renesas"`):
* "AUTOMOTIVE FIRMWARE EXTRACTION AND ANALYSIS TECHNIQUES" by Jan Van den Herrewegen https://etheses.bham.ac.uk/id/eprint/11516/1/VandenHerrewege...
Not really what I was anticipating finding but seems relevant to your interests--I don't think it was already in your resource list.
While the thesis addresses the Renesas 78K0 rather than the Renesas 78K0R, from a brief look at the "Flash Protection" PDF Application Note in your resource list it seems there's a large overlap.
Perhaps most significantly the author presents "novel methods" that combine bootloader binary analysis with constraint-based power glitching in an effort to improve on the results described in "Shaping the Glitch".
While I haven't read the entire 186 pages :D they theorize that using their approach extracting 8kB firmware might only take ~10 hours.
And, most helpfully, they even published their source code under the GPL here: https://github.com/janvdherrewegen/bootl-attacks
So, an interesting adjacent read even if it turns out not to be directly applicable to your situation.
Given I have an interest in & a little experience with firmware reversing my original thought was to maybe provide some hopefully helpful references that more generically related to firmware reversing but more specific is good too, I guess. :)
In terms of reverse engineering tooling, I've used Rizin/Cutter/radare2 previously: https://rizin.re https://cutter.re
On the CAN tooling/info front, you might be interested in taking a look at my "Adequate CAN" list which I originally wrote-up for a client a couple years ago: https://gitlab.com/RancidBacon/adequate-can
Some other probably outdated reverse engineering tooling links of mine: https://web.archive.org/web/20200119074540/http://www.labrad...
In terms of how to approach RE, other than just "getting started & digging in" & learning by doing, I've sometimes found it informative to read other people's firmware reverse engineering write-ups to learn about potentially useful approaches/tools.
Anyway, hopefully some of this is helpful!
[0] I have a tendency to be a little... "verbose" and/or "thorough" (depending on one's POV :) ) so I'll probably split this over a couple of comments, in case I run out of steam while writing and for topic separation.
-
Veles – A new age tool for binary analysis
In Cutter[1][2] we have an idea to implement thes same feature[3] as a plugin, but our priorities lie elsewhere die to the lack of enough hands. Contributions are welcome.
- Debugger Ghidra Class
-
Fq: Jq for Binary Formats
For this kind of task, using low-level debugger tools is probably better. Rizin[1][2]/Cutter[3][4] could help. We also have GSoC participant this year who works hard on improving debuginfo and debugging support[5]. I personally also like Binary Ninja, they recently made their debugger stable enough[6].
[2] https://github.com/rizinorg/rizin
[4] https://github.com/rizinorg/cutter
[5] https://rizin.re/posts/gsoc-2023-announcement/
[5] https://binary.ninja/2023/05/03/3.4-finally-freed.html#debug...
- Cutter (Reverse Engineering Tool) v2.2.1
-
What is this?
Something like https://cutter.re/ or https://www.nirsoft.net/utils/dll_export_viewer.html Could possibly give you some insight. I guess the question though is, what are you trying to do with it?
- Cutter Release 2.2.0
-
Dis This: Disassemble Python code online
Rizin[1] (and therefore Cutter[2]) supports interactive disassembly and analysis (but not decompilation) of the Python bytecode[3][4]. Apart from that it also supports Java and Lua bytecode for different versions.
[1] https://rizin.re
[3] https://github.com/rizinorg/rizin/tree/dev/librz/asm/arch/py...
[4] https://github.com/rizinorg/rizin/blob/dev/librz/analysis/p/...
-
Stuff like this is why everyone uses scripting languages these days, since the main value prop of high-level languages is their ability to reliably print backtraces.
cutter is quite nice though
What are some alternatives?
ImHex-Patterns - Hex patterns, include patterns and magic files for the use with the ImHex Hex Editor
ghidra - Ghidra is a software reverse engineering (SRE) framework
catsight - Cross-platform process memory inspector
rz-ghidra - Deep ghidra decompiler and sleigh disassembler integration for rizin
x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
rizin - UNIX-like reverse engineering framework and command-line toolset.
pycdc - C++ python bytecode disassembler and decompiler
r2ghidra - Native Ghidra Decompiler for r2
extfstools - Tools for extracting files from ext2,3,4 filesystem images
efiSeek - Ghidra analyzer for UEFI firmware.
XMachOViewer - XMachOViewer is a Mach-O viewer for Windows, Linux and MacOS
AppImageLauncher - Helper application for Linux distributions serving as a kind of "entry point" for running and integrating AppImages