Software Alternatives & Reviews

x64_dbg VS Binary Ninja

Compare x64_dbg VS Binary Ninja and see what are their differences

x64_dbg logo x64_dbg

x64_dbg is a 32-bit and 64-bit assembler level debugger for Windows. Key features:

Binary Ninja logo Binary Ninja

A reverse engineering platform and GUI
  • x64_dbg Landing page
    Landing page //
    2022-10-14
  • Binary Ninja Landing page
    Landing page //
    2023-09-28

x64_dbg videos

No x64_dbg videos yet. You could help us improve this page by suggesting one.

+ Add video

Binary Ninja videos

Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1

More videos:

  • Demo - 312 Using Binary Ninja for Modern Malware Analysis Dr Jared DeMott Mr Josh Stroschein
  • Review - Binary Ninja Overview

Category Popularity

0-100% (relative to x64_dbg and Binary Ninja)
IDE
25 25%
75% 75
Software Development
27 27%
73% 73
OS & Utilities
34 34%
66% 66
Decompiler
16 16%
84% 84

User comments

Share your experience with using x64_dbg and Binary Ninja. For example, how are they different and which one is better?
Log in or Post with

Social recommendations and mentions

Based on our record, x64_dbg should be more popular than Binary Ninja. It has been mentiond 16 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

x64_dbg mentions (16)

  • Too Many Fonts in Windows 10 Can Cause Slow Application Starts
    I have never heard anyone say anything good about the Visual Studio debugger before. Now, I'm not a Windows person but I'm not gonna argue for gdb or lldb here. RemedyBG and x64dbg are the two debuggers I've heard good things about though I've never used them because, again, not a Windows person. [1] https://remedybg.handmade.network/ [2] https://x64dbg.com/. - Source: Hacker News / 9 months ago
  • Advice needed on disabling license checks on some old proprietary abandonware
    I'd help you out but because of circumstances I have no laptop with me. You need x86/x64 debugger to do this. This one for example Find a registration procedure and look for possible brenching to other parts of code in assembly. It's probably somewhere in the beginning. Exclude code validation and export new program version. Source: 11 months ago
  • C/C++: Where is the address of a declared variable stores?
    One interesting thing you can do is download an app like https://x64dbg.com/ or cheat engine, which will let you see the memory. You can look at the process for something you’ve made and explore it. Log a memory address from your app then go find it in the tool and interpret the bytes as an integer. Find a string and see how that works. Find a pointer, read the address it’s pointing then go look at that address.... Source: about 1 year ago
  • Is there a tool that can show you an EIP trace of a game?
    If you want to also do dynamic analysis (debugging) you can use https://x64dbg.com. Source: over 1 year ago
  • How do I get opcode instructions from hexdump
    .exe is a complex format and not something you're going to extract raw instructions from using a hexdump. What you need is a "disassembler". For Windows I'd recommend x64dbg. Source: over 1 year ago
View more

Binary Ninja mentions (9)

  • [Media] I'm currently learning Rust. Out of curiosity, I opened the resulting binary as a text file, and among the garbled text characters, I saw this weird text. Is this normal or is there something wrong with the compiled binary? It's the "Hello, World!" sample program and it executes normally.
    If you really want to poke around in the binary, you can use a decompiler like IDA, Ghidra, or Binary Ninja's free version. Source: 6 months ago
  • Ida Free
    Still $$$ for crippled functionality. As an alternative, https://binary.ninja is gaining traction at work. - Source: Hacker News / 10 months ago
  • Teaching A Machine To Identify Vulnerabilities (Part 1)
    As I said, a regular text editor won’t do for reading a binary file, so I needed to choose a disassembler to break the challenge binaries out into their basic blocks. I chose to use Binary Ninja because it has a very easy-to-use Python API, and it’s hobbyist-level cheap (for comparison, the industry-standard disassembler is IDA Pro, which they will sell to you for roughly an arm, and continue to pick off your... - Source: dev.to / over 3 years ago
  • Why do most hackers base their personality around hacking?
    It’s an awesome reverse engineering tool (https://binary.ninja). Has really nice api support so you can basically automate anything and make plugins for custom architectures and stuff like that. Source: almost 2 years ago
  • Introducing Decompiler Explorer
    It's basically the opposite of https://godbolt.org/ -- put in binary, get out decompilation amongst many decompilers. It's open source (though you need a Binary Ninja and Hex-Rays license to run internally -- you'll want to check with the respective companies to make sure your particular license is acceptable for use even internally first!). Source: almost 2 years ago
View more

What are some alternatives?

When comparing x64_dbg and Binary Ninja, you can also consider the following products

Ghidra - Software Reverse Engineering (SRE) Framework

IDA - The best-of-breed binary code analysis tool, an indispensable item in the toolbox of world-class software analysts, reverse engineers, malware analyst and cybersecurity professionals.

OllyDbg - OllyDbg is a 32-bit assembler level analysing debugger.

Immunity Debugger - Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer...

X64dbg - X64dbg is a debugging software that can debug x64 and x32 applications.

Cutter - Open Source RE Platform powered by radare2.