#IDAPro

williballenthinwilliballenthin
2025-03-28

Here are my notes on using a Python virtual environment with IDA Pro:

williballenthin.com/post/using

2025-03-27

My idalib-based "vulnerability divination" tool suite is finally available in the official Hex-Rays Plugins & Apps repository! ๐Ÿฆ€

plugins.hex-rays.com/search-re

#idapro #idalib #vulnerabilityresearch
#reverseengineering

2025-03-18
C++ macro for x64 programs that breaks ida hex-rays decompiler tool.

https://github.com/android1337/brkida

"This project exploits the fact that IDA decompiler fails when it encounters a stack access on a pointer that's too big."

#IDA #IDAPro #HexRays
Alexandre Borgesalexandreborges
2025-03-12

The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:

exploitreversing.com/2025/03/1

I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA @HexRaysSA for their constant and uninterrupted support, which have helped me write these articles.

I hope you enjoy reading it and have an excellent day.

Exploiting Reversing (ER) series: article 05 | Hyper-V (part 01)
2025-03-12

The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:

exploitreversing.com/2025/03/1

I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA @HexRaysSA for their constant and uninterrupted support, which have helped me write these articles.

I hope you enjoy reading it and have an excellent day.

#hypervisor #hyperv #architecture #cybersecurity #research #internals #idapro #informationsecurity #microsoft

Exploiting Reversing (ER) series: article 05 | Hyper-V (part 01)
2025-03-01

๐—ž๐—ฎ๐—น๐—บ๐—ฎ๐—ฟ๐—–๐—ง๐—™ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฑ ๐—ถ๐˜€ ๐—ท๐˜‚๐˜€๐˜ ๐—ฎ๐—ฟ๐—ผ๐˜‚๐—ป๐—ฑ ๐˜๐—ต๐—ฒ ๐—ฐ๐—ผ๐—ฟ๐—ป๐—ฒ๐—ฟ - ๐—ฐ๐—ผ๐—บ๐—ฒ ๐—ฐ๐—ผ๐—บ๐—ฝ๐—ฒ๐˜๐—ฒ ๐˜„๐—ถ๐˜๐—ต ๐˜๐—ต๐—ฒ ๐—ฏ๐—ฒ๐˜€๐˜ ๐—ฐ๐—ผ๐—บ๐—ฝ๐—ฒ๐˜๐—ถ๐˜๐—ถ๐˜ƒ๐—ฒ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ๐˜€ ๐—ณ๐—ฟ๐—ผ๐—บ ๐—ฎ๐—ฟ๐—ผ๐˜‚๐—ป๐—ฑ ๐˜๐—ต๐—ฒ ๐˜„๐—ผ๐—ฟ๐—น๐—ฑ ๐—ฎ๐—ป๐—ฑ ๐˜„๐—ถ๐—ป ๐—ด๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ฝ๐—ฟ๐—ถ๐˜‡๐—ฒ๐˜€!

The #KalmarCTF 2025 is on the horizon, and Kalmarunionen is ready to raise the bar once again. Mark your calendars for March 7th - 9th, 2025, and gear up for a 48-hour showdown of skill, and pure CTF grit.

๐‡๐ž๐ซ๐žโ€™s ๐ฐ๐ก๐š๐ญโ€™s ๐ข๐ง ๐ฌ๐ญ๐จ๐ซ๐ž:
With a generous nod to @HexRaysSA for making the coveted #IDAPro licenses possible, we promise an unforgettable event brimming with complex challenges in binary exploitation, reverse engineering, and other classic #CTF categories.

๐Ÿฅ‡ First Place: 3x IDA Pro Named Licenses* with 2 Decompilers each
๐Ÿฅˆ Second Place: 2x IDA Pro Licenses* with 2 Decompilers each
๐Ÿฅ‰ Third Place: 1x IDA Pro License* with 2 Decompilers

Why join hashtag #KalmarCTF 2025?
- Test yourself against top global teams and except some fun and original challenges
- Immerse yourself in a thriving community of passionate CTF players and hackers.

If youโ€™re ready to push your limits, claim your glory, and maybe take home some serious #HexRays loot, head over to KalmarC.TF for all the details.
REassemble your dream team, and lets see who takes all home the licenses this year.

#hacking #cybersecurity #CTF

A promotional banner for KalmarCTF 2025, a cybersecurity Capture The Flag (CTF) competition. The event takes place from Friday, March 7, 2025, at 17:00 UTC to Sunday, March 9, 2025, at 17:00 UTC. The banner features the KalmarCTF logo with a stylized flag, a dark blue background with a world map pattern, and white text. It includes a link to more information at KALMARC.TF. Prize details mention IDA PRO licenses with decompilers, sponsored by Hex-Rays and Powered by IDA.
2025-02-26

#ESETresearch has released DelphiHelper, a plugin ๐Ÿ”Œ for #IDAPro that aids in analyzing Delphi binaries.

Check it out on ESETโ€™s GitHub at github.com/eset/DelphiHelper

Proud to be recognized among the notable submissions of the 2024 x.com/HexRaysSA Plugin Contest: hex-rays.com/blog/2024-plugin-

2025-02-25

The 3rd episode of our #OffensiveRust series, "Streamlining vulnerability research with #IDAPro and #Rust", is here! @raptor introduces new tools to assist with reverse engineering and vulnerability research, based on @HexRaysSA IDA and @binarly_io idalib.

security.humanativaspa.it/stre

2025-02-21

@HexRaysSA have announced IDA Pro v9.1 Beta

There are a lot changes, follow the link for changelog
docs.hex-rays.com/release-note

Some highlights:
* Heaven's gate can now be debugged
* Rust version detection
* Improved decompilation on ARM64, RISCV, PPC
* Still no support for Linux ARM

#idapro #disassembler #decompiler #tooloftrade #reversing #reversengineering

2025-02-17

Congrats to @xorpse @binarly_io for the well-deserved third place of their idalib #rust bindings in this yearโ€™s #idapro plugin contest! ๐ŸŽŠ

hex-rays.com/blog/2024-plugin-

Alexandre Borgesalexandreborges
2025-02-04

The fourth article (126 pages) of the Exploiting Reversing Series (ERS) is available on:

exploitreversing.com/2025/02/0

I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me write these articles.

The fifth article (ERS 05) will be released soon. Stay tuned.

I hope you enjoy reading it and have an excellent day.

2025-02-04

The fourth article (126 pages) of the Exploiting Reversing Series (ERS) is available on:

exploitreversing.com/2025/02/0

I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me write these articles.

The fifth article (ERS 05) will be released soon. Stay tuned.

I hope you enjoy reading it and have an excellent day.

#apple #ios #macOS #architecture #cybersecurity #research #internals #vulnerability #idapro #informationsecurity

Alexandre Borgesalexandreborges
2025-01-15

The tenth article (35 pages) of the Malware Analysis Series (MAS) is available on:

exploitreversing.com/2025/01/1

The series is now complete and this was my last contribution on malware analysis.

Next week (JAN/22) the third article of the Exploiting Reversing Series (ERS 03), which is my long-term series, will be released. I hope you like it.

Have an excellent day.

2025-01-15

The tenth article (35 pages) of the Malware Analysis Series (MAS) is available on:

exploitreversing.com/2025/01/1

I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.

I promised to write a series of ten articles, and this is the last one. I hope that over the years I have provided professionals around the world with a little help in improving their malware analysis and reverse engineering skills. The series is now complete and this was my last contribution on malware analysis.

Next week (JAN/22) the third article of the Exploiting Reversing Series (ER 03), which is my long-term series, will be released. I hope you like it.

Have an excellent day.

#linux #malware #reverseengineering #reversing #idapro #malwareanalysis #elf #crypto #ransomware

2025-01-08

The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:

exploitreversing.com/2025/01/0

I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.

Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).

Have a great day.

#windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis

2024-12-23

An intuitive query API for IDA Pro

github.com/junron/ida2py

CC: @junron

#idapro #plugin

2024-12-20

IDA Pro v9.0 SP1 is now published.

hex-rays.com/blog/ida-9.0-serv

Changelog
docs.hex-rays.com/release-note

BTW; I have checked UI improvements but they didn't add search/find/replace feature to script editor.

And still no support for Linux Arm64.

#ida #idapro #disassembler

2024-12-06

TIL: Do you know you can grab instruction pointer by using fldz and fstenv instruction from Intel processor?

@Kaspersky team shared a new write-up about their IDA Pro plugin while reversing #FinSpy malware. Don't miss this write-up.

securelist.com/hrtng-ida-pro-p

#plugin #idapro #kaspersky #malware

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst