Top 15 PEBrowseDbg64 Interactive Alternative and Similar Softwares | May 2024

A very powerful, versatile, and customizable Win32/Win64 user mode debugger/disassembler. PEBrowseDbg64 Interactive is not a source code debugger, but operates at the Intel x64 instruction level and therefore at the lowest level where your program executes. The debugger fully supports Microsoft .NET managed processes and seamlessly allows interop or mixed-mode debugging. It also supports debugging child processes.

1. IDA Pro

IDA Pro The IDA Pro Disassembler and debugger is a multi-processor disassembler and debugger hosted on the Windows, Linux and Mac OS X Platforms.......

2. Radare

Radare Radare, the highly featured reverse engineering framework.NOTE: it is better to use the "radare2", not the "radare".Features Multi-architecture and multi-platform GNU/Linux, Android, *BSD, OSX, iPhoneOS, Windows{32,64} and Solaris i8080, 8051, x86{16,32,64}, avr, arc{4,compact} , arm{thumb,neon,aarch64}, c55x+, dalvik, ebc, gb, java, sparc, mips, nios2, powerpc, whitespace, brainfuck, malbolge, z80, psosvm, m68k,......

3. radare2

radare2 Radare project started as a forensics tool, a scriptable commandline hexadecimal editor able to open disk files, but later support for analyzing binaries, disassembling code, debugging programs, attaching to remote gdb servers, ...Radare is a portable reversing framework that can... • Disassemble (and assemble for) many different architectures • Debug......

4. Insect

Insect Insect is made to aid the process of troubleshooting third party integrations via RESTful APIs. The solution particularly useful when working with SaaS platforms and for documenting purposes.- Made with SaaS platforms in mind- Supports RESTful APIs with JSON payloads- Real-time data interception- Highly volatile - not storing intercepted data-......

5. OllyDbg

OllyDbg OllyDbg is a 32-bit assembler level analysing debugger. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. * Debugs multithread applications * Attaches to running programs * Configurable disassembler, supports both MASM and IDEAL formats * MMX, 3DNow! and SSE data types and......

6. x64_dbg

x64_dbg x64_dbg is a 32-bit and 64-bit assembler level debugger for Windows.Key features: * Open-source * Intuitive and familiar, yet new user interface * C-like expression parser * Full-featured debugging of DLL and EXE files (TitanEngine) * IDA-like sidebar with jump arrows * IDA-like instruction token highlighter (highlight registers etc.)......

7. Bokken

Bokken Bokken is a GUI for the Pyew and Radare projects so it offers almost all the same features that Pyew has and and some of the Radare's ones. It's intended to be a basic disassembler, mainly, to analyze malware and vulnerabilities.Currently Bokken is neither an hexadecimal editor nor a full......

8. Immunity Debugger

Immunity Debugger Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industrys first heap analysis tool built specifically for heap creation, and a large and well supported Python API for easy extensibility.A debugger......

9. Hopper GDB Server

Hopper GDB Server Hopper GDB Server allows you to debug your applications, locally and/or remotely.......

10. binwalk

binwalk Binwalk is a firmware analysis tool designed for analyzing, reverse engineering and extracting data contained in firmware images. Written in Python , it is fully scriptable and easily extendable via custom signatures and plugins.......

11. EasyHook

EasyHook EasyHook makes it possible to extend (via hooking) unmanaged code APIs with pure managed functions, from within a fully managed environment on 32- or 64-bit Windows XP SP2, Windows Vista x64, Windows Server 2008 x64, Windows 7, Windows 8.1, and Windows 10.EasyHook supports injecting assemblies built for .NET Framework 3.5......

12. Dependency Walker

Dependency Walker Dependency Walker is a free utility that extracts a hierarchal tree of dependencies from any 32- or 64-bit Windows executable module (EXE, DLL, OCX, SYS, DRV, etc.), including those that were built for Windows CE. For each dependency, it lists all function exports as well as the exports that are......

13. Deviare In-Process

Deviare In-Process Deviare In-Process is a code interception engine for Microsoft Windows®. It is a dual license library, GPLv3 and Commercial. The source code is available at GitHub.This library is at the core of our Deviare 2.0 technology, it is the best alternative to Microsoft Detours® but at a more convenient price.The......

14. Resource Hacker

Resource Hacker Resource Hacker has been designed to be the complete resource editing tool: compiling, viewing, decompiling and recompiling resources for both 32bit and 64bit Windows executables.Resource Hacker can open any type of Windows executable (*.exe; *.dll; *.scr; *.mui etc) so that individual resources can be added modified or deleted within these......

15. Mhook

Mhook If you dabble in this area then you’ll already know that Microsoft Research's Detours pretty much sets the benchmark when it comes to API hooking. Why don't we get a comparison out of the way quickly then?DETOURS VS. MHOOKDetours is available for free with a noncommercial license but it only......