A powerful disassembler and a versatile debugger IDA Pro as a disassembler is capable of creating maps of their execution to show the binary instructions that are actually executed by the processor in a symbolic representation (assembly language). Advanced techniques have been implemented into IDA Pro so that it can generate assembly language source code from machine-executable code and make this complex code more human-readable.
The debugging feature augmented IDA with the dynamic analysis. It supports multiple debugging targets and can handle remote applications. Its cross-platform debugging capability enables instant debugging, easy connection to both local and remote processes and support for 64-bit systems and new connection possibilities.
Jotti might be a bit more popular than IDA. We know about 13 links to it since March 2021 and only 11 links to IDA. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Everyone of you "pirates" should be using a image of your hard-drive to restore from. This should have been done after your windows installation, updates, drivers, OS tweaks, etc. You use the free version of Macrium Reflect, you use the "make a boot thumb drive" option with the software and it will automatically partition the USB drive for you and on the non-boot partition, you stick the image. Anytime you think... Source: about 1 year ago
Anything you execute, including installers, run through VirusTotal, Jotti AntiVirus, or my personal favorite: ShieldPro. Source: over 1 year ago
Just scanned the apk on https://virusscan.jotti.org which also uses Ikarus and says that it's fine. Only Fortinet gives the same result. Source: over 1 year ago
Let me give you a pro tip from guys doing netsec since the 90s: Get rid of 3rd party AV and use https://virusscan.jotti.org/ for suspicious downloads. Source: over 1 year ago
There is also https://virusscan.jotti.org/ but virustotal is the largest one and communicates with the companies whose scanners they use to report new threats. Source: about 2 years ago
The tool used in those white screenshots is called IDA pro, a decompiler. https://hex-rays.com/ida-pro/. - Source: Hacker News / 2 months ago
Learn assembly and then fuck around with https://hex-rays.com/ida-pro/. Gonna take you a week max. Source: 7 months ago
To RE the executable IDA Pro can be very useful: Https://hex-rays.com/ida-pro/. Source: over 1 year ago
It’s a good disassembler that is fairly expensive. https://hex-rays.com/ida-pro/. - Source: Hacker News / over 1 year ago
It's a disassembler, widely used for creating, for example, cracks/executable patches for games. https://hex-rays.com/ida-pro/. - Source: Hacker News / over 1 year ago
VirusTotal - VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick...
Ghidra - Software Reverse Engineering (SRE) Framework
Metadefender - Metadefender, by OPSWAT, allows you to quickly multi-scan your files for malware using 43 antivirus...
OllyDbg - OllyDbg is a 32-bit assembler level analysing debugger.
Hybrid-Analysis.com - Hybrid-Analysis.com is a free malware analysis service powered by payload-security.com.
X64dbg - X64dbg is a debugging software that can debug x64 and x32 applications.