From f358ebcb5d5b6fcf344f78cd45019e0e05c3c92a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dawid=20P=C4=85gowski?= Date: Mon, 26 Aug 2024 14:09:25 +0200 Subject: [PATCH] Add x64dbg to credits I used this as much as Ghidra, if not more. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 358f4a2..1fa3170 100644 --- a/README.md +++ b/README.md @@ -126,3 +126,4 @@ LegitimateScheme.SolveLegitimateChallenge( for dissecting S7-Comm Plus packets. - [Cheng Lei, Li Donghong, Ma Liang, The spear to break the security wall of S7CommPlus](https://www.blackhat.com/docs/eu-17/materials/eu-17-Lei-The-Spear-To-Break%20-The-Security-Wall-Of-S7CommPlus-wp.pdf) - a document describing the S7-Comm Plus protocol - [Ghidra Software Reverse Engineering Framework](https://github.com/NationalSecurityAgency/ghidra) - "Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate." +- [x64dbg](https://github.com/x64dbg/x64dbg) - "An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis."