Here are my notes on using a Python virtual environment with IDA Pro:
https://williballenthin.com/post/using-a-virtualenv-for-idapython/
Here are my notes on using a Python virtual environment with IDA Pro:
https://williballenthin.com/post/using-a-virtualenv-for-idapython/
My idalib-based "vulnerability divination" tool suite is finally available in the official Hex-Rays Plugins & Apps repository! ๐ฆ
https://plugins.hex-rays.com/search-results?search_term=0xdea
MCP Server for IDA Pro
CC: @mrexodia
https://github.com/mrexodia/ida-pro-mcp
#idapro #idaproplugin #ai #claude #vibereversing #reverseengineering
The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:
https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/
I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA @HexRaysSA for their constant and uninterrupted support, which have helped me write these articles.
I hope you enjoy reading it and have an excellent day.
#hypervisor #hyperv #architecture #cybersecurity #research #internals #idapro #informationsecurity #microsoft
The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:
https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/
I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA @HexRaysSA for their constant and uninterrupted support, which have helped me write these articles.
I hope you enjoy reading it and have an excellent day.
#hypervisor #hyperv #architecture #cybersecurity #research #internals #idapro #informationsecurity #microsoft
๐๐ฎ๐น๐บ๐ฎ๐ฟ๐๐ง๐ ๐ฎ๐ฌ๐ฎ๐ฑ ๐ถ๐ ๐ท๐๐๐ ๐ฎ๐ฟ๐ผ๐๐ป๐ฑ ๐๐ต๐ฒ ๐ฐ๐ผ๐ฟ๐ป๐ฒ๐ฟ - ๐ฐ๐ผ๐บ๐ฒ ๐ฐ๐ผ๐บ๐ฝ๐ฒ๐๐ฒ ๐๐ถ๐๐ต ๐๐ต๐ฒ ๐ฏ๐ฒ๐๐ ๐ฐ๐ผ๐บ๐ฝ๐ฒ๐๐ถ๐๐ถ๐๐ฒ ๐ต๐ฎ๐ฐ๐ธ๐ฒ๐ฟ๐ ๐ณ๐ฟ๐ผ๐บ ๐ฎ๐ฟ๐ผ๐๐ป๐ฑ ๐๐ต๐ฒ ๐๐ผ๐ฟ๐น๐ฑ ๐ฎ๐ป๐ฑ ๐๐ถ๐ป ๐ด๐ฟ๐ฒ๐ฎ๐ ๐ฝ๐ฟ๐ถ๐๐ฒ๐!
The #KalmarCTF 2025 is on the horizon, and Kalmarunionen is ready to raise the bar once again. Mark your calendars for March 7th - 9th, 2025, and gear up for a 48-hour showdown of skill, and pure CTF grit.
๐๐๐ซ๐โs ๐ฐ๐ก๐๐ญโs ๐ข๐ง ๐ฌ๐ญ๐จ๐ซ๐:
With a generous nod to @HexRaysSA for making the coveted #IDAPro licenses possible, we promise an unforgettable event brimming with complex challenges in binary exploitation, reverse engineering, and other classic #CTF categories.
๐ฅ First Place: 3x IDA Pro Named Licenses* with 2 Decompilers each
๐ฅ Second Place: 2x IDA Pro Licenses* with 2 Decompilers each
๐ฅ Third Place: 1x IDA Pro License* with 2 Decompilers
Why join hashtag #KalmarCTF 2025?
- Test yourself against top global teams and except some fun and original challenges
- Immerse yourself in a thriving community of passionate CTF players and hackers.
If youโre ready to push your limits, claim your glory, and maybe take home some serious #HexRays loot, head over to KalmarC.TF for all the details.
REassemble your dream team, and lets see who takes all home the licenses this year.
#ESETresearch has released DelphiHelper, a plugin ๐ for #IDAPro that aids in analyzing Delphi binaries.
Check it out on ESETโs GitHub at https://github.com/eset/DelphiHelper
Proud to be recognized among the notable submissions of the 2024 https://x.com/HexRaysSA Plugin Contest: https://hex-rays.com/blog/2024-plugin-contest-winners
The 3rd episode of our #OffensiveRust series, "Streamlining vulnerability research with #IDAPro and #Rust", is here! @raptor introduces new tools to assist with reverse engineering and vulnerability research, based on @HexRaysSA IDA and @binarly_io idalib.
https://security.humanativaspa.it/streamlining-vulnerability-research-with-ida-pro-and-rust
@HexRaysSA have announced IDA Pro v9.1 Beta
There are a lot changes, follow the link for changelog
https://docs.hex-rays.com/release-notes/9_1beta
Some highlights:
* Heaven's gate can now be debugged
* Rust version detection
* Improved decompilation on ARM64, RISCV, PPC
* Still no support for Linux ARM
#idapro #disassembler #decompiler #tooloftrade #reversing #reversengineering
Congrats to @xorpse @binarly_io for the well-deserved third place of their idalib #rust bindings in this yearโs #idapro plugin contest! ๐
The fourth article (126 pages) of the Exploiting Reversing Series (ERS) is available on:
https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/
I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me write these articles.
The fifth article (ERS 05) will be released soon. Stay tuned.
I hope you enjoy reading it and have an excellent day.
#apple #ios #macOS #architecture #cybersecurity #research #internals #vulnerability #idapro
The fourth article (126 pages) of the Exploiting Reversing Series (ERS) is available on:
https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/
I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me write these articles.
The fifth article (ERS 05) will be released soon. Stay tuned.
I hope you enjoy reading it and have an excellent day.
#apple #ios #macOS #architecture #cybersecurity #research #internals #vulnerability #idapro #informationsecurity
The tenth article (35 pages) of the Malware Analysis Series (MAS) is available on:
https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/
The series is now complete and this was my last contribution on malware analysis.
Next week (JAN/22) the third article of the Exploiting Reversing Series (ERS 03), which is my long-term series, will be released. I hope you like it.
Have an excellent day.
#linux #malware #reverseengineering #reversing #idapro #malwareanalysis #elf #crypto #ransomware
The tenth article (35 pages) of the Malware Analysis Series (MAS) is available on:
https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/
I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.
I promised to write a series of ten articles, and this is the last one. I hope that over the years I have provided professionals around the world with a little help in improving their malware analysis and reverse engineering skills. The series is now complete and this was my last contribution on malware analysis.
Next week (JAN/22) the third article of the Exploiting Reversing Series (ER 03), which is my long-term series, will be released. I hope you like it.
Have an excellent day.
#linux #malware #reverseengineering #reversing #idapro #malwareanalysis #elf #crypto #ransomware
The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:
https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/
I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.
Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).
Have a great day.
#windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis
IDA Pro v9.0 SP1 is now published.
https://hex-rays.com/blog/ida-9.0-service-pack-1
Changelog
https://docs.hex-rays.com/release-notes/9_0sp1
BTW; I have checked UI improvements but they didn't add search/find/replace feature to script editor.
And still no support for Linux Arm64.
TIL: Do you know you can grab instruction pointer by using fldz and fstenv instruction from Intel processor?
@Kaspersky team shared a new write-up about their IDA Pro plugin while reversing #FinSpy malware. Don't miss this write-up.