idaxex
ttddbg
idaxex | ttddbg | |
---|---|---|
1 | 2 | |
85 | 543 | |
- | 0.7% | |
0.0 | 1.6 | |
3 months ago | 13 days ago | |
C++ | C++ | |
BSD 3-clause "New" or "Revised" License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
idaxex
-
Decompiling xbox 360 game?
Xenia is good as a quick test for RE work to verify mods, even better if you fork it and implement your own toolset. However if you want to look into reverse engineering binaries you should really look into IDA or Ghidra. IDA has some pretty useful plugins for RE’inf 360 executables. Ghidra has an equivalent plugin as well; https://github.com/zeroKilo/XEXLoaderWV
ttddbg
What are some alternatives?
XEXLoaderWV - Ghidra Loader Module for X360 XEX Files
ScyllaHide - Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide
efiXplorer - IDA plugin for UEFI firmware analysis and reverse engineering automation
getsymbol - Simple tool to download debugging symbols from Microsoft, Google, Mozilla and Citrix symbol servers for reverse engineers compatible with Windows 8.1, 10 and 11 [GET https://api.github.com/repos/dbgsymbol/getsymbol: 403 - Repository access blocked]
tenet - A Trace Explorer for Reverse Engineers
seer - Seer - a gui frontend to gdb
Hacking-Windows - A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
rr - Record and Replay Framework
xenia - Xbox 360 Emulator Research Project
x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
flare-ida - IDA Pro utilities from FLARE team
CpuidSpoofer - x64dbg plugin for simple spoofing of CPUID instruction behavior