Based on our record, Ghidra seems to be a lot more popular than ImHex. While we know about 64 links to Ghidra, we've tracked only 6 mentions of ImHex. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Next time you find yourself reverse engineering a weird protocol - use ImHex. I can't recommend it enough - it's perfect for the job and it's free and Open Source. https://imhex.werwolv.net/. - Source: Hacker News / 3 months ago
Just one note: Please use UI scaling; it's near impossible to read on a 150% 4k screen (much less on 100%). Unfortunately, young eyes don't last forever. The UI looks very much like ImHex (https://imhex.werwolv.net/) is this a coincidence, or is it the standard ImGui look and feel? I wish ImHex had a decompiler for Z80 as well, but this is much better. - Source: Hacker News / 3 months ago
I now use ImHex after looking for years for a good one. It has a pattern language to provide highlighting. https://imhex.werwolv.net/. - Source: Hacker News / 4 months ago
Download a hex editor such as ImHex and open it. I'd recommend downloading the portable version of whatever hex editor you are using if it's offered. That way you don't have to install the program and can instantly delete it off your drive when you're done. Source: 9 months ago
Documentation for AoE2 graphics formats have been enhanced and there is now a pattern file that you can use in imHex to explore the SLP file structure. Source: about 1 year ago
I've got no experience with reverse-engineering executables, but I got a bunch of code-like stuff showing up when I fed ULTIMA.EXE to Ghidra and told it to analyze it with all the flags set. Source: 12 months ago
The whole game is written in C++ (game logic intertwined with graphics). Ghidra can help you deconstruct the game binaries, but you need to put in a GREAT great effort to even get a starting point. Cheat Engine has been successful for some purposes, including an AI enabling utility for multiplayer (use with great care!). Source: 12 months ago
What I think you’re talking about is reverse engineering. It’s basically taking a program and analysing the compiled code to attempt to find out how it works. It’s a fairly expansive topic, and fairly tricky to do but look at anything to do with Ghidra to get started. Source: about 1 year ago
Oh also just as an aside Ghidra is a really cool free tool developed by the NSA which can reverse engineer software by looking at its executable and recreating the C code from the instructions and static data within. It's another way to get familiarized with the relationship between C code and the instructions it compiles to. Source: about 1 year ago
There exist decompilers and other tools for helping make sense of assembly and that can automate some of the conversion back to higher level languages. In my brief involvement with Slippi I used Ghidra - a tool developed by the NSA, to do some of that kind of work, which I found a little amusing. Source: about 1 year ago
Hex Workshop - Hex Workshop: Hex Editor, Sector Editor, Base Converter and Hex Calculator for Windows
IDA - The best-of-breed binary code analysis tool, an indispensable item in the toolbox of world-class software analysts, reverse engineers, malware analyst and cybersecurity professionals.
BinHex CryPactor - Manipulate binary and hexadecimal strings!
OllyDbg - OllyDbg is a 32-bit assembler level analysing debugger.
Tweak hex editor - Fast and efficient, terminal based hex editor.
Binary Ninja - A reverse engineering platform and GUI