Skip to content

A reverse engineering tool that'll (hopefully) supply the place of Cheat Engine for linux

License

Notifications You must be signed in to change notification settings

YanLinAung/PINCE

Repository files navigation

#PINCE
PINCE is a gdb front-end/reverse engineering tool written in python3, C and pyqt5. It can do

  • Memory searching(planned)
  • Variable Inspection(working on it)
  • Disassemble(planned)
  • Debugging(planned)
  • Code Injection(planned)

PINCE is a abbreviation for "PINCE is not Cheat Engine". PINCE's GUI is heavily "inspired(;D)" by Cheat Engine.

#Building
To run PINCE, simply run this command chain:

sudo apt-get install pip3  
sudo apt-get install gdb  
sudo apt-get install python3-pyqt5  
sudo apt-get install pyqt5-dev-tools
sudo pip3 install psutil  
sudo pip3 install pexpect

Then create the file .gdbinit in your home directory and add the line set auto-load safe-path / to it
Finally, cd to PINCE directory and run sudo python3 PINCE.py

#History

  • A few weeks till 17/01/2016 : Learned GDB, process of analysis
  • 17/01/2016-22/01/2016 : Basic design, grasping of Python3 and Pyqt5, proof-testing
  • 22/01/2016 : First commit
  • 19/02/2016 : Moved to Github from Bitbucket
  • 25/02/2016 : First successful implementation of thread injection(A new age dawns!)

About

A reverse engineering tool that'll (hopefully) supply the place of Cheat Engine for linux

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 84.3%
  • C 15.3%
  • Other 0.4%