Meanwhile #IDA Pro: "Oops! internal error 1783 occurred."
#idapro #reverseengineering #hexrays #gdbserver #qemu
Latest posts tagged with #IDAPro on Bluesky
Meanwhile #IDA Pro: "Oops! internal error 1783 occurred."
#idapro #reverseengineering #hexrays #gdbserver #qemu
IDA Pro plugin: indent guides plugin for hex-rays decompiler
github.com/libtero/idag...
#ida #idapro #decompiler #plugin #reverseengineering
Hex-Rays released IDA Pro v9.3
docs.hex-rays.com/release-note...
#reverse #reverseengineering #decompiler #idapro #reversing
While waiting for the upcoming release of #IDAPro 9.3 by @HexRaysSA, I have made some updates and bug fixes to my idalib-based headless IDA #plugins rhabdomancer, haruspex, and augur.
Check out the changelogs for all the details and enjoy! […]
I pushed an early version of REshare IDA exporter:
github.com ->
I don't have time to run x-platform tests right now, but if you do I'd appreciate any bug reports!
#ReverseEngineering #IDA #IDAPro
Original->
IDA Pro 9.3 Beta is launched. And Linux ARM64 installers are coming.
docs.hex-rays.com/release-note...
#linux #arm64 #ida #idapro #reverseengineering #reversing
ifred - IDA Palette updated for Qt6. You can now download prebuilt binaries of the plugin if you want:
github.com/blue-devil/i...
#idapro #plugin #ida #idapalette #ifred #reverse #reversing #reverseengineering
Introducing HCLI: The Modern Command-Line Interface for IDA:
hex-rays.com/blog/introdu...
#idapro #interface #ida #hcli #reverseengineering
Oh hey, Hex-Rays released IDA 9.2. There are new Go features like support for multiple return values to annotate Go function calls correctly. Jump Anywhere is a nice usability improvement supplanting the need to remember 5 keyboard shortcuts.
hex-rays.com/blog/id...
#idapro #reverseengineering
* UI: Jump Anywhere is a new dialog, successor of the JumpAsk, is introduced
* UI: Redeginated Register subview
* CLI: No more TUI interface by `idat`
Still no release for Linux AARCH64 :/
docs.hex-rays.com/release-note...
#reverseengineering #decompilation #idapro #powertools #newrelease
VirusTotal: l’Intelligenza Artificiale arriva nell’Assembly
il blog: insicurezzadigitale.com/virustotal-l...
#cybersecurity #assembly #codeinsight #google #idapro #virustotal
Just read up on the IDA Domain API updates from Hex Rays. This on top of idalib is a nice step forward in usability. Def recommend checking out the All Things IDA video.
Looking forward to seeing the use case spotlights that they’ll be publishing.
youtu.be/IaOucXb033Q
#idapro #reverseengineering
x86byte.github.io/x86byte_kpwn...
#reverseengineering #Reverse_Engineering #Obfuscation #Crypter #Cpp17 #cpp #protection #CodeProtect #idapro #Compiler #MSVC #microsot #windows #malwareResearch #malwareanalysis
To anybody wondering why lumen.abda.nl is offline: It's maintenance, the database is being upgraded.
Should be back online soon.
#IDAPro #Lumina
My idalib-based "vulnerability divination" tool suite is finally available in the official Hex-Rays Plugins & Apps repository! 🦀
plugins.hex-rays.com/search-results
#idapro #idalib #vulnerabilityresearch
#reverseengineering
MCP Server for IDA Pro
CC: infosec.exchange/@mrexodia
github.com/mrexodia/ida...
#idapro #idaproplugin #ai #claude #vibereversing #reverseengineering
[Lonely Pablo meme, Pablo staring into the distance] MASTERED GHIDRA, cannot reverse vibes.
For my #Security friends. 🫶
#ghidra #idapro #disassemblers #decompilers
#vibecoding #vibe
C++ macro for x64 programs that breaks ida hex-rays decompiler tool.
github.com ->
"This project exploits the fact that IDA decompiler fails when it encounters a stack access on a pointer that's too big."
#IDA #IDAPro #HexRays
Original->
The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:
exploitreversing.com/2025/03/12/e...
I hope you enjoy reading it and have an excellent day.
#hypervisor #hyperv #architecture #cybersecurity #research #internals #idapro #informationsecurity #microsoft
The 3rd episode of our #OffensiveRust series, "Streamlining vulnerability research with #IDAPro and #Rust", is here! @raptor introduces new tools to assist with reverse engineering and vulnerability research, based on @HexRaysSA IDA and @binarly_io idalib […]
Image 1 of 3 of ESET's DelphiHelper for IDA Pro.
Image 2 of 3 of ESET's DelphiHelper for IDA Pro.
Image 3 of 3 of ESET's DelphiHelper for IDA Pro.
#ESETresearch has released DelphiHelper, a plugin for #IDAPro that aids in analyzing Delphi binaries. Check it out on ESET’s GitHub: github.com/eset/DelphiH.... Proud to be recognized among the notable submissions of the 2024 x.com/HexRaysSA Plugin Contest: hex-rays.com/blog/2024-pl...
Congrats to @xorpse @binarly_io for the well-deserved third place of their idalib #rust bindings in this year’s #idapro plugin contest! 🎊
https://hex-rays.com/blog/2024-plugin-contest-winners
The fourth article (126 pages) of the Exploiting Reversing Series (ERS) is available on:
exploitreversing.com/2025/02/04/e...
I hope you enjoy reading it and have an excellent day.
#apple #ios #macOS #architecture #cybersecurity #research #internals #vulnerability #idapro
A new processor module of #idapro can analyze compiled yara rule. github.com/milankovo/Ya...
An intuitive query API for IDA Pro
github.com/junron/ida2py
CC: @junron@infosec.exchange
#idapro #plugin
IDA Pro v9.0 SP1 is now published.
hex-rays.com/blog/ida-9.0...
Changelog
docs.hex-rays.com/release-note...
BTW; I have checked UI improvements but they didn't add search/find/replace feature to script editor.
And still no support for Linux Arm64.
#ida #idapro #disassembler
TIL: Do you know you can grab instruction pointer by using fldz and fstenv instruction from Intel processor?
@Kaspersky team shared a new write-up about their IDA Pro plugin while reversing #FinSpy malware. Don't miss this write-up.
securelist.com/hrtng-ida-pr...
#idapro #malware
IDA_Plugin_AntiDebugSeeker
Automatically identify and extract potential anti-debugging techniques used by malware.
github.com/LAC-Japan/ID...
#idapro #plugin
Home is where the ✨shifted pointers✨ are. 😊 #IDAPro
See et al.'s "Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons"
The final presentation was See et al.'s "Binary Sight-Seeing: Accelerating #ReverseEngineering via Point-of-Interest-Beacons" on automating the identification of #POIs in binaries. (www.acsac.org/2023/p...) 5/5
#MalwareAnalysis #IDAPro #Ghidra #Botnets