Classfile Reader & Writer is a Java package that makes it easy to read and write Java class files. It does not provide any help with displaying the contents of a class file (besides debug output) or disassembe the byte codes, but can read "obfuscated" class files such as those generated by Crema.
The uda is program for disassembling a binary file. It is able to read different binary file formats and different instruction sets. The functionality is based on plugins and external definition of an instruction set. It has a plugin for reading the Unix ELF format, and a plugin for reading the instruction stream and instruction set for the Intel PIII processor.
The Perl x86 Disassembler is a full x86 disassembler written in Perl, independent of objdump. The Perl script makes use of the opcode tables from libdisasm [derived from the bastard project] and is distributed as part of libdisasm. This is the same script that is included in the Perl-Disassembler-HOWTO; either the HOWTO or the libdisasm distribution will provide the required files [x86disasm.pl and 1386.opcodes.map] and documentation.
The Obcode (obfuscated code) library allows the programmer to perform arithmetic (e.g. data encryption and serial code generation) over abstract, parameterizable, and obfuscated data types using special high-level operators. The resulting low-level binary code doesn't reveal any real data directly and is if not very difficult, then at least very boring to reverse engineer and trace.
Fenris is a multipurpose tracer, debugger, and code analysis tool that detects and documents high-level language constructions, can recover symbols, graph program execution flow, detect internal functions, recover symbol tables, and deal with anti-debugging protection. It features a command-line interface as well as a SoftICE-alike GUI and Web frontend.
The Examiner is a tool to analyze foreign binary executables. Its goal is to provide a commented, disassembled version of the code without running the program. It analyzes possibly hostile executables that an intruder may have placed on a system. It was designed for forensic purposes but could be used for basic reverse-engineering goals as well.