1 00:00:00,750 --> 00:00:04,380 There are a few different tools that can be used for reverse engineering. 2 00:00:04,560 --> 00:00:08,670 Now these tools are not only for US and disassembly use applications. 3 00:00:09,060 --> 00:00:14,160 Most of them actually can be used for reverse engineering or other applications, operating systems 4 00:00:14,160 --> 00:00:17,900 and even used by security researchers to reverse engineer malware. 5 00:00:18,270 --> 00:00:22,880 By far, one of the most popular assembler out there is it April? 6 00:00:23,040 --> 00:00:26,750 It is used by many security researchers, many security professionals. 7 00:00:26,760 --> 00:00:31,050 But the problem is actually it's not free and it's actually quite expensive. 8 00:00:31,350 --> 00:00:32,930 Now, another tool is Hopper. 9 00:00:33,360 --> 00:00:39,420 It is not also not free, and it allows you to disassemble and perform static analyses of executable 10 00:00:39,420 --> 00:00:40,780 files and applications. 11 00:00:41,190 --> 00:00:47,760 Now, another simple, yet useful tool is actually the object file, display tool or tool that actually 12 00:00:47,760 --> 00:00:53,610 comes with the Mac OS X by default, and you can actually pass it over to a few Linux distributions. 13 00:00:53,880 --> 00:01:00,930 OK, now one last one that I want to share with you is a tool called Flex, which is a set of application 14 00:01:00,930 --> 00:01:04,510 or debugging tools or functionality for an iris development. 15 00:01:04,620 --> 00:01:09,270 You can actually download it from the GitHub repository that I am showing on the screen.