logo
  • Products
  • Case studies
  • Resources
  • Company
  • Pricing
My Account
IDA Pro

State-of-the-art, binary code analysis tool

IDA Home

Affordable tool for reverse engineering hobbyists

IDA Free

Lightweight IDA at no cost to evaluate basic features

IDA Classroom

Powerful IDA for education providers and universities

IDA Pro OEM

The license you need to sell software or SaaS based on IDA

Features

Decompilers

Easily readable pseudocode to enhance your binary analysis

Private Lumina Add-on

Fast function recognition within your organization

Teams Add-on

Collaborative reverse engineering

Others

Training courses

Expert-level courses for mastering complex reverse engineering techniques.

Help

FAQs

Commonly asked questions and their answers.

Documentation

Comprehensive user guides and technical documentation.

Our reseller partners

Information about our official reseller partners.

Malware analysis & Digital forensics

Digital forensic investigations occur when a system is compromised by malicious software.

Vulnerability research & Penetration testing

There is a strong incentive for software developers to attack their own software for the purpose of hardening security.

Intellectual property

Intellectual property is an essential asset of many companies.

Dynamic Analysis & Debugging

Disassembling a computer program can reveal a great deal about its behavior, but there are many ways to limit the usefulness of the raw disassembly.

Automotive security

Modern vehicles are rolling software ecosystems. They are now more reliant on firmware running on microcontrollers instead of pure hardware like in the past.

Interoperability

Information is rarely produced and consumed strictly inside an application.

See all case studies

Help

Pricing

Information on our product pricing and available plans.

FAQs

Commonly asked questions and their answers.

Our reseller partners

Information about our official reseller partners.

Learn & Connect

Documentation

Comprehensive user guides and technical documentation.

Blog

Insights, updates, and articles from the Hex-Rays team.

Forum

Participate in our forum for questions and community support.

Incentive

Beta Program

Be first to try new features and shape the outcome.

Bug Bounty

Report security vulnerabilities and earn rewards for your contributions.

CTF Sponsorship Program

You’re hosting a competition or competing on the world stage, we want to help.

Supercharge

Community plugins

Enhance IDA with a variety of plugins.

Help

FAQs

Commonly asked questions and their answers.

Download center

Access and download the latest versions of SDKs & utilities.

Our reseller partners

Information about our official reseller partners.

Company

About us

Discover Hex-Rays’ journey in revolutionizing binary analysis and supporting cybersecurity professionals worldwide.

Careers

Join our team of experts and contribute to advancing reverse engineering and cybersecurity tools.

Contact us

Do you need advice in selecting the right plan or managing your account?

Legal

Privacy policy

Learn how we prioritize and protect your data and ensure transparency in our practices.

Terms of use

Understand the guidelines and conditions for using our products and services effectively.

Cookies notice

Help

General questions?

Do you need advice in selecting the right plan or managing your account?

Need Support?

Open a support ticket to request assistance from our support team.

logo
  • Products
    IDA Pro

    State-of-the-art, binary code analysis tool

    IDA Home

    Affordable tool for reverse engineering hobbyists

    IDA Free

    Lightweight IDA at no cost to evaluate basic features

    IDA Classroom

    Powerful IDA for education providers and universities

    IDA Pro OEM

    The license you need to sell software or SaaS based on IDA

    Features

    Decompilers

    Easily readable pseudocode to enhance your binary analysis

    Private Lumina Add-on

    Fast function recognition within your organization

    Teams Add-on

    Collaborative reverse engineering

    Others

    Training courses

    Expert-level courses for mastering complex reverse engineering techniques.

  • Case studies
    Malware analysis & Digital forensics

    Digital forensic investigations occur when a system is compromised by malicious software.

    Vulnerability research & Penetration testing

    There is a strong incentive for software developers to attack their own software for the purpose of hardening security.

    Intellectual property

    Intellectual property is an essential asset of many companies.

    Dynamic Analysis & Debugging

    Disassembling a computer program can reveal a great deal about its behavior, but there are many ways to limit the usefulness of the raw disassembly.

    Automotive security

    Modern vehicles are rolling software ecosystems. They are now more reliant on firmware running on microcontrollers instead of pure hardware like in the past.

    Interoperability

    Information is rarely produced and consumed strictly inside an application.

    See all case studies
  • Resources

    Learn & Connect

    Documentation

    Comprehensive user guides and technical documentation.

    Blog

    Insights, updates, and articles from the Hex-Rays team.

    Forum

    Participate in our forum for questions and community support.

    Incentive

    Beta Program

    Be first to try new features and shape the outcome.

    Bug Bounty

    Report security vulnerabilities and earn rewards for your contributions.

    CTF Sponsorship Program

    You’re hosting a competition or competing on the world stage, we want to help.

    Supercharge

    Community plugins

    Enhance IDA with a variety of plugins.

  • Company

    Company

    About us

    Discover Hex-Rays’ journey in revolutionizing binary analysis and supporting cybersecurity professionals worldwide.

    Careers

    Join our team of experts and contribute to advancing reverse engineering and cybersecurity tools.

    Contact us

    Do you need advice in selecting the right plan or managing your account?

    Legal

    Privacy policy

    Learn how we prioritize and protect your data and ensure transparency in our practices.

    Terms of use

    Understand the guidelines and conditions for using our products and services effectively.

    Cookies notice
  • Pricing
My Account
  • There are no suggestions because the search field is empty.

Posts written by Igor Skochinsky

    Apr 7, 2023

    Igor’s Tip of the Week #135: Exporting disassembly from IDA

    Although most of the time you can probably do all of the reversing inside IDA, occasionally you may ...

    I
    Igor Skochinsky ✦ Posted: Apr 7, 2023
    Mar 31, 2023

    Igor’s Tip of the Week #134: ARM BL jumps

    If you ever looked at IDA ARM module’s processor-specific settings, you may have been puzzled by ...

    I
    Igor Skochinsky ✦ Posted: Mar 31, 2023
    Mar 24, 2023

    Igor’s Tip of the Week #133: Alignment items

    Sometimes you may see mysterious align keywords in the disassembly, which can appear both in code ...

    I
    Igor Skochinsky ✦ Posted: Mar 24, 2023
    Mar 17, 2023

    Igor’s Tip of the Week #132: Finding “hidden” cross-references

    When analyzing firmware or other binaries without metadata, IDA is not always able to discover and ...

    I
    Igor Skochinsky ✦ Posted: Mar 17, 2023
    Mar 10, 2023

    Igor’s Tip of the Week #131: Advanced filters in choosers

    We’ve covered choosers previously and talked about searching, sorting and filtering. The default ...

    I
    Igor Skochinsky ✦ Posted: Mar 10, 2023
    Mar 3, 2023

    Igor’s Tip of the Week #130: Source line numbers

    Debug information, whether present in the binary or loaded separately, can contain not only symbols ...

    I
    Igor Skochinsky ✦ Posted: Mar 3, 2023
    Feb 24, 2023

    Igor’s Tip of the Week #129: Searching for text in database

    Using the string list is one way to look for text in the binary but it has its downsides: building ...

    I
    Igor Skochinsky ✦ Posted: Feb 24, 2023
    Feb 17, 2023

    Igor’s Tip of the Week #128: String list

    When exploring an unfamiliar binary, it may be difficult to find interesting places to start from. ...

    I
    Igor Skochinsky ✦ Posted: Feb 17, 2023
    Feb 10, 2023

    Igor’s Tip of the Week #127: Changing function bounds

    When analyzing regular, well-formed binaries, you can usually rely on IDA’s autoanalysis to create ...

    I
    Igor Skochinsky ✦ Posted: Feb 10, 2023
    Prev
    4 5 6 7 8
    Next

    Stay up-to-date with the latest news!

    Stay up to date with the newest blog posts

    Products

    IDA Home
    IDA Pro
    IDA Free
    IDA Classroom
    IDA Pro OEM
    Private Lumina Add-on
    Teams Add-on
    Training courses

    Case studies

    Malware Analysis & Digital Forensics
    Vulnerability research & penetration testing
    Dynamic Analysis & Debugging
    Automotive Security
    Interoperability
    Software Assessments

    Classroom

    IDA Classroom Free
    Classroom discount for IDA Pro

    Resources

    Documentation
    Forum
    Blog
    Community plugins

    Pricing

    For organizations
    For individuals
    For education providers
    Our reseller partners

    Company

    About us
    Careers
    Privacy notice
    Terms of use
    Cookies notice
    Contact us

    Connect with the community on

    X Mastodon LinkedIn YouTube
    logo

    © 2025 Copyright Hex-Rays