PE Explorer: A user-friendly disassembler (32-bit only).
XNTSV: displays information on Windows system structures in binaries.
PDBRipper: Analyze binaries: Analyzes PDB files that get generated when compiling.
radare2: reverse engineering cmdline tools.
Detect-It-Easy: Analyze binaries: A binary/packer analyzer.
NET process explorer / assembly browser / decompiler
richprint: prints compiler information stored in a binary’s rich header (“Which Visual C compiler version was this binary built with?”).
Similar to ldd on Linux and otool -m on macOS.
Dependency Walker: Displays DLL dependencies of binaries.
Shares much of the functionality of Process Monitor from Sysinternals, but has some interesting differences and is (other than the Sysinternals Suite) entirely Open Source.
ProcessHacker: A powerful task manager.
Therefore, the following isn’t a “top 100 best of list” but just a pick of some rather unknown tools, that I found to be useful for some task. In this blogpost, I would like to mention some lesser known tools that might be equally useful. Especially ProcessExplorer, a powerful task manager replacement, and ProcessMonitor, a syscall tracing tool, are widely known. When working on Windows as a sysadmin or developer, it’s hard to get around Microsoft’s Sysinternals Suite of tools. Illustration: iStock/Getty Images (modified)