How should I design a mode for reverse engineering executables (or should I even use a mode)?

This page summarizes the projects mentioned and recommended in the original post on /r/emacs

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
  • emacs-capstone

    elisp bindings for the capstone disassembler

  • Ah, so I wrote https://github.com/anticomputer/emacs-capstone and I'll note that it was mostly a vehicle for me to get used to the (at the time) new emacs native module API.

  • rizin

    UNIX-like reverse engineering framework and command-line toolset.

  • I made that first repository and I'd really like to see this mode. At the time I was envisioning a magit-like client for radare2 using r2pipe. Maybe using librz directly is a better idea?

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts