mirror of
https://github.com/x64dbg/x64dbg.git
synced 2024-11-27 06:40:24 +00:00
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
binary-analysiscppctfcybersecuritydebuggerdebuggingdisassemblerdynamic-analysisexploit-developmenthackingmalware-analysisoscpprogram-analysisreverse-engineeringsecuritysecurity-toolswindowsx64x86x86-64
help | ||
x64_dbg_bridge | ||
x64_dbg_dbg | ||
x64_dbg_exe | ||
x64_dbg_gui/Project | ||
.gitignore | ||
bug.ico | ||
clean.bat | ||
LICENSE | ||
README | ||
release.bat | ||
todo_dbg.txt | ||
x64_dbg_sceme.vsd | ||
x64_dbg.sln |
[This is a new version of this repository. The old version can be found ] [here: https://bitbucket.org/mrexodia/x64_dbg_old ] >Downloads: Releases of x64_dbg can be found at http://download.x64dbg.com >Overview: x64_dbg is an open-source x32/x64 debugger for windows. >Features: - Open-source - Intuitive and familiar, yet new user interface - C-like expression parser - Full-featured debugging of DLL and EXE files (TitanEngine) - IDA-like sidebar with jump arrows - IDA-like instruction token highlighter (highlight registers etc.) - Memory map - Symbol view - Thread view - Content-sensitive register view - Fully customizable color scheme - Dynamically recognize modules and strings - Import reconstructor integrated (Scylla) - Fast disassembler (BeaEngine) - User database (JSON) for comments, labels, bookmarks etc. - Plugin support with growing API - Extendable, debuggable scripting language for automation - Multi-datatype memory dump - Basic debug symbol (PDB) support - Dynamic stack view - Built-in assembler (XEDParse) >Known bugs: - Memory breakpoints sometimes fail (TitanEngine bug) >License: x64_dbg is licensed under LGLPv3, which means you can freely distribute and modify the source of x64_dbg, as long as you share your changes with us. Plugins do not have to be open source or free to distribute. >Credits: - Debugger core by TitanEngine Community Edition - Disassembly powered by BeaEngine (Updated) - Assembly powered by XEDParse - Import reconstruction powered by Scylla - JSON powered by Jansson - Database compression powered by lz4 - Bug icon by VisualPharm - Interface icons by Fugue - Website by tr4ceflow >Special Thanks: - acidflash - cyberbob - Teddy Rogers - EXETools community - Tuts4You community - DMichael - Artic - Nukem - ahmadmansoor >Developers: - Mr. eXoDia - Sigma - tr4ceflow