Based on our record, Process Monitor seems to be a lot more popular than Binary Ninja. While we know about 182 links to Process Monitor, we've tracked only 9 mentions of Binary Ninja. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
To be sure that our exe is actually looking for the DLL, fire up the SysInternals' Process Monitor. - Source: dev.to / 7 months ago
Don't know what PTAT stands for, but whenever I have issues with windows software running properly I pull out Process Monitor to log what that program was doing at the time of the error message. Sometimes there is a clue such as not being able to find a particular file, or registry key, or something else crashing etc. Source: 10 months ago
This might be a bit advanced but if it was me I would probably get frustrated and use SysInternals specifically procmon Https://learn.microsoft.com/en-us/sysinternals/downloads/procmon. Source: 11 months ago
Used Procmon, Diskmon with a mix of CrystalDiskinfo in my testings to kinda figure out the browsers that did a lot of writing and reading to my old SSD in a ancient laptop I have. You can pretty much get estimates of the ones that use too much Disk resources. Source: 11 months ago
You can use something like Process Monitor (https://learn.microsoft.com/en-us/sysinternals/downloads/procmon) to see what processes are interacting with which registry keys. Source: 11 months ago
If you really want to poke around in the binary, you can use a decompiler like IDA, Ghidra, or Binary Ninja's free version. Source: 7 months ago
Still $$$ for crippled functionality. As an alternative, https://binary.ninja is gaining traction at work. - Source: Hacker News / 11 months ago
As I said, a regular text editor won’t do for reading a binary file, so I needed to choose a disassembler to break the challenge binaries out into their basic blocks. I chose to use Binary Ninja because it has a very easy-to-use Python API, and it’s hobbyist-level cheap (for comparison, the industry-standard disassembler is IDA Pro, which they will sell to you for roughly an arm, and continue to pick off your... - Source: dev.to / over 3 years ago
It’s an awesome reverse engineering tool (https://binary.ninja). Has really nice api support so you can basically automate anything and make plugins for custom architectures and stuff like that. Source: almost 2 years ago
It's basically the opposite of https://godbolt.org/ -- put in binary, get out decompilation amongst many decompilers. It's open source (though you need a Binary Ninja and Hex-Rays license to run internally -- you'll want to check with the respective companies to make sure your particular license is acceptable for use even internally first!). Source: almost 2 years ago
Process Explorer - The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'l…
IDA - The best-of-breed binary code analysis tool, an indispensable item in the toolbox of world-class software analysts, reverse engineers, malware analyst and cybersecurity professionals.
htop - htop - an interactive process viewer for Unix. This is htop, an interactive process viewer for Unix systems. It is a text-mode application (for console or X terminals) and requires ncurses. Latest release: htop 2.
Ghidra - Software Reverse Engineering (SRE) Framework
glances system monitoring - Glances is a cross-platform system monitoring tool written in Python. Written in Python, Glances will run on almost any plaftorm : GNU/Linux, FreeBSD, OS X and Windows.
OllyDbg - OllyDbg is a 32-bit assembler level analysing debugger.