x64dbg is an open-source binary debugger for Windows designed to facilitate malware analysis and reverse engineering of executables without source code.
Key Features:
Comprehensive disassembly capabilities powered by Zydis.
Assembly support via XEDParse and asmjit for precise instruction manipulation.
Import reconstruction feature from Scylla to analyze external dependencies.
Extensible plugin system enabling custom functionality.
Audience & Benefit:
Ideal for security researchers, reverse engineers, and malware analysts, x64dbg provides a robust platform to debug binaries, understand their behavior, and extract insights without source code access. It streamlines the process of analyzing executables, enhancing research workflows and supporting both 32-bit and 64-bit architectures.
The tool can be installed via winget for seamless integration into your development environment.
README
x64dbg
Note
Please run install.bat before you start committing code, this ensures your code is auto-formatted to the x64dbgstandards.
User database (JSON) for comments, labels, bookmarks, etc.
Plugin support with growing API
Extendable, debuggable scripting language for automation
Multi-datatype memory dump
Basic debug symbol (PDB) support
Dynamic stack view
Built-in assembler (XEDParse)
Executable patching
Yara Pattern Matching
Decompiler (Snowman)
Analysis
License
x64dbg is licensed under GPLv3, which means you can freely distribute and/or modify the source of x64dbg, as long as you share your changes with us. The only exception is that plugins you write do not have to comply with the GPLv3 license. They do not have to be open-source and they can be commercial and/or private. The only exception to this is when your plugin uses code copied from x64dbg. In that case you would still have to share the changes to x64dbg with us.