
Every reverse engineer, malware analyst, and researcher eventually develops a personal toolkit of utilities they regularly use for analysis, unpacking, or cracking. In this review, I will share my own version. This will be useful for anyone who hasn’t yet compiled their own set and is just beginning to explore this field. However, even seasoned reverse engineers might find it interesting to see what tools their peers are using.
Read full article →