1 00:00:00,750 --> 00:00:04,380 There are a few different tools that can be used for reverse engineering. 2 00:00:04,560 --> 00:00:08,670 Now these tools are not only for US and disassembly use applications. 3 00:00:09,060 --> 00:00:14,160 Most of them actually can be used for reverse engineering or other applications, operating systems 4 00:00:14,160 --> 00:00:21,000 and even used by security researchers to reverse engineer malware, by far one of the most popular assembler 5 00:00:21,000 --> 00:00:21,700 out there. 6 00:00:21,720 --> 00:00:22,880 Is it April? 7 00:00:23,040 --> 00:00:26,750 It is used by many security researchers, many security professionals. 8 00:00:26,760 --> 00:00:31,050 But the problem is actually it's not free and it's actually quite expensive. 9 00:00:31,350 --> 00:00:32,930 Now, another tool is Hopper. 10 00:00:33,360 --> 00:00:39,420 It is not also not free, and it allows you to disassemble and perform static analyses of executable 11 00:00:39,420 --> 00:00:40,780 files and applications. 12 00:00:41,190 --> 00:00:47,760 Now, another simple, yet useful tool is actually the object file, display tool or tool that actually 13 00:00:47,760 --> 00:00:53,610 comes with the Mac OS X by default, and you can actually pass it over to a few Linux distributions. 14 00:00:53,910 --> 00:01:00,930 OK, now one last one that I want to share with you is a tool called Flex, which is a set of application 15 00:01:00,930 --> 00:01:04,510 or debugging tools or functionality for an iris development. 16 00:01:04,620 --> 00:01:09,300 You can actually download it from the GitHub repository that I am showing on the screen.