Useful Tools

From DisNCord Community Wiki
Revision as of 18:22, 23 January 2023 by Vmlemon (talk | contribs) (Port my old GitHub Wiki page (https://github.com/vmlemon/understand/wiki/Reverse-Engineering-Tools - entirely self-created, so OK to put under Creative Commons Attribution-ShareAlike), to MediaWiki, and extend it, with unshield. Further contributions are encouraged. (ToDo - Add category).)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

File System Manipulation

  • Aaru supports a fairly comprehensive collection of disk image, partition table, and file system formats, and is built with the Microsoft .NET Framework - builds exist, for several operating systems.

Archive Manipulation

  • 7-Zip supports the Windows Imaging format (.WIM) disk images, with LZX compression, as used by Windows 8.1
  • XADMaster supports a fairly comprehensive collection of compression, and archival formats, and can also expand some disk image formats - this seems to be the basis of the "unar" utility, provided for Ubuntu, and some other Linux distributions.
  • unshield is a CLI tool, for unpacking various flavours of InstallShield archive

Firmware Image Extraction

  • The RandomSHX utility, for Windows will extract the contents of some Motorola P2K (e.g. A835) "UNIX Generated SuperFile" firmware archives - this requires Windows, and does not work with UNC paths
  • The `srecord` package, under Ubuntu contains a utility, that can convert Motorola S-Record files, into plain binaries: (for example srec_cat C139_V1.0.03.E.m0 -Output C139_V1.0.03.E.bin -Binary
  • BinWalk is extremely useful, for extracting files, and resources out of firmware images, executables, and file system structures