Update (June, 4th, 2014): Added Hex-Rays Decompiler x64
64-bits platform is becoming a standard and reverse engineering of the PE32+ files is now a daily bread to many malware analysts. Tools that are designed to make things easier are luckily out there and new ones keep popping up all over the place. Unfortunately, many of the tools are not mature enough yet and often crash or do some funny stuff, but this is developing really fast and hopefully the RCE arsenal will expand soon.
Here is a short list of the tools I came across and use most of them in my research and analysis of PE32+ files. If you know any other useful tools, I’d be grateful if you let me know. Thanks!
Docs
- Very useful primer for x64 n00bs – http://uuu.enseirb.fr/~amacabies//pdf/intro-to-x64-reversing.pdf; contains useful examples and links [I don’t add them here; download PDF and take it from there]
Bypassing signature checks/disabling PageGuard
- Driver Signature Enforcement Overrider 1.3b – http://www.ngohq.com/?page=dseo
- Disable PatchGuard & Driver Signing on X64 Windows 7 + SP1 – http://fyyre.ivory-tower.de/projects/no_pg_ds_v3.rar
- Disable PatchGuard on Windows 8 x64 – http://fyyre.ivory-tower.de/projects/disable_pg_win8.rar
PE Viewer/Editors supporting PE32+
- PEStudio – http://www.winitor.com/
- Explorer Suite – http://www.ntcore.com/exsuite.php
- PE Insider – http://icerbero.com/peinsider/
- Hiew – http://www.hiew.ru/
- Of course, there are many PE editors out there – if you can recommend any I’d appreciate if you give me a shout
Disassembler
- IDA Pro – https://www.hex-rays.com/products/ida/
Decompiler
- Hex-Rays Decompiler https://www.hex-rays.com/products/decompiler/news.shtml#140604
- SmartDec – http://derevenets.com/download.html
- C4 Decompiler – http://www.c4decompiler.com/
Debugger (they are also disassemblers)
Ollydbg 64 is still not ready, but there are a couple of tools that can be useful even if not that user-friendly:
- Windbg – http://msdn.microsoft.com/en-us/library/windows/hardware/ff551063%28v=vs.85%29.aspx
- PEBrowseDbg – http://www.smidgeonsoft.prohosting.com/pebrowse-pro-interactive-debugger.html
- IDA debugger – https://www.hex-rays.com/products/ida/
- FDBG – http://fdbg.x86asm.net/
- Nanomite – https://github.com/zer0fl4g/Nanomite
- BugDBG – http://pespin.w.interia.pl/
- Edb-Debugger – https://code.google.com/p/edb-debugger/
- Visual Dux Debugger – http://www.duxcore.com/index.php/prod/visual-duxdebugger/overview
Process / Memory Viewer
- Process Hacker – http://processhacker.sourceforge.net/
Process dumpers
- Scylla – https://github.com/NtQuery/Scylla
- Procdump – http://technet.microsoft.com/en-us/sysinternals/dd996900.aspx
Hook Detector
API Monitor
- Rohitab Api Monitor – http://www.rohitab.com/downloads
Hiding Processes
Thanks to Ange and Nanu Jogi for fixes and suggestions.