From 4e9b3ea5566ea79e7904fa8bff3fc3ba2409b82e Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Thu, 30 May 2019 15:20:45 -0400 Subject: [PATCH] Update README.md --- exploit_development/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exploit_development/README.md b/exploit_development/README.md index 0763ca0..b865874 100644 --- a/exploit_development/README.md +++ b/exploit_development/README.md @@ -24,7 +24,7 @@ ## Reverse Engineering Tools The following are some of the most popular reverse engineering tools. HOWEVER! GO TO THE [REVERSE ENGINEERING SECTION](https://github.com/The-Art-of-Hacking/art-of-hacking/blob/master/reverse_engineering/README.md) for more references. - +* [Ghidra](https://ghidra-sre.org/) - a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate * [Interactive Disassembler (IDA Pro)](https://www.hex-rays.com/products/ida/) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml). * [WDK/WinDbg](https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg. * [OllyDbg](http://www.ollydbg.de/) - x86 debugger for Windows binaries that emphasizes binary code analysis.