|Duncan Ogilvie 9f4ddfad9e|
An open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the source code for. There are many features available and a comprehensive plugin system to add your own. You can find more information on the blog!
Installation & Usage
- Download a snapshot from GitHub, SourceForge or OSDN and extract it in a location your user has write access to.
- Optionally use
x96dbg.exeto register a shell extension and add shortcuts to your desktop.
- You can now run
x32\x32dbg.exeif you want to debug a 32-bit executable or
x64\x64dbg.exeto debug a 64-bit executable! If you are unsure you can always run
x96dbg.exeand chose your architecture there.
You can also compile x64dbg yourself with a few easy steps!
This is a community effort and we accept pull requests! See the CONTRIBUTING document for more information. If you have any questions you can always contact us or open an issue. You can take a look at the easy issues to get started.
- Debugger core by TitanEngine Community Edition
- Disassembly powered by Zydis
- Assembly powered by XEDParse and asmjit
- Import reconstruction powered by Scylla
- JSON powered by Jansson
- Database compression powered by lz4
- Bug icon by VisualPharm
- Interface icons by Fugue
- Website by tr4ceflow
You can find an exhaustive list of GitHub contributors here.
- Sigma for developing the initial GUI
- All the donators!
- Everybody adding issues!
- People I forgot to add to this list
- Writers of the blog!
- EXETools community
- Tuts4You community
- Teddy Rogers
- TEAM DVT
Without the help of many people and other open-source projects, it would not have been possible to make x64dbg what is it today, thank you!