Useful Tools: Difference between revisions

From DisNCord Community Wiki
Jump to navigation Jump to search
Kraaabs (talk | contribs)
m macFUSE
Kraaabs (talk | contribs)
Line 17: Line 17:
== Binary reverse engineering ==
== Binary reverse engineering ==


* Dependency Walker for understanding Windows program dependencies and what's used by the program, helpful for software archaeology.
* [https://www.dependencywalker.com/ Dependency Walker] for understanding Windows program dependencies and what's used by the program, helpful for software archaeology.
* [https://ghidra-sre.org/ Ghidra] is an open-source set of RE tools, including a set of decompilers and disassemblers for most binary formats.


[[Category:Preservation and Documentation]]
[[Category:Preservation and Documentation]]

Revision as of 18:43, 23 January 2023

File System Manipulation

  • Aaru supports a fairly comprehensive collection of disk image, partition table, and file system formats, and is built with the Microsoft .NET Framework - builds exist, for several operating systems.
  • kpartx is a fairly standard command to automatically create loop devices for whole disk images (assuming regular partition table types Linux can understand)
  • macFUSE allows you to use FUSE filesystems on macOS

Archive Manipulation

  • 7-Zip supports the Windows Imaging format (.WIM) disk images, with LZX compression, as used by Windows 8.1
  • XADMaster supports a fairly comprehensive collection of compression, and archival formats, and can also expand some disk image formats - this seems to be the basis of the "unar" utility, provided for Ubuntu, and some other Linux distributions.
  • unshield is a CLI tool, for unpacking various flavours of InstallShield archive

Firmware Image Extraction

  • The RandomSHX utility, for Windows will extract the contents of some Motorola P2K (e.g. A835) "UNIX Generated SuperFile" firmware archives - this requires Windows, and does not work with UNC paths
  • The srecord package, under Ubuntu contains a utility, that can convert Motorola S-Record files, into plain binaries: (for example srec_cat C139_V1.0.03.E.m0 -Output C139_V1.0.03.E.bin -Binary
  • BinWalk is extremely useful, for extracting files, and resources out of firmware images, executables, and file system structures

Binary reverse engineering

  • Dependency Walker for understanding Windows program dependencies and what's used by the program, helpful for software archaeology.
  • Ghidra is an open-source set of RE tools, including a set of decompilers and disassemblers for most binary formats.