ddisasm
XPEViewer
Our great sponsors
ddisasm | XPEViewer | |
---|---|---|
4 | 3 | |
617 | 877 | |
3.1% | - | |
9.5 | 10.0 | |
6 days ago | 2 days ago | |
C++ | C++ | |
GNU Affero General Public License v3.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ddisasm
-
Starting an open-source re-implementation of an old game
The closest you can get to something like you describe is https://github.com/GrammaTech/ddisasm, but even that won't give you a byte-exact result due to alignment and instruction encoding differences. And it's not perfect, you'll get subtle new bugs. And distributing it is problematic.
-
Is taking the ASM dump from Ida pro after human correction a good way to re-write the software from scratch?
Reassembling is easier but still pretty hard if you want something actually modifiable cause you need to distinguish code and data and find cross-references. There's a research project: https://github.com/GrammaTech/ddisasm
- Program modification via reassembling
-
Hacking a game with DLL injection [Game Hacking 101]
It would be interesting to explore a different path: https://github.com/GrammaTech/ddisasm
XPEViewer
What are some alternatives?
x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
pe-bear-releases - PE-bear (builds only)
e9patch - A powerful static binary rewriting tool
pe-sieve - Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
pharos - Automated static analysis tools for binary programs
pe-util - List shared object dependencies of a portable executable (PE)
Triton - Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Pepper - PE32 (x86) and PE32+ (x64) binaries analysis tool, resources viewer/extractor.
qiling - A True Instrumentable Binary Emulation Framework
pe-bear - Portable Executable reversing tool with a friendly GUI
e9afl - AFL binary instrumentation
DIE-engine - DIE engine