logo
  • Products
  • Case studies
  • Resources
  • Company
  • Pricing
My Account
IDA Pro

State-of-the-art, binary code analysis tool

IDA Home

Affordable tool for reverse engineering hobbyists

IDA Free

Lightweight IDA at no cost to evaluate basic features

IDA Classroom

Powerful IDA for education providers and universities

IDA Pro OEM

The license you need to sell software or SaaS based on IDA

Features

Decompilers

Easily readable pseudocode to enhance your binary analysis

Private Lumina Add-on

Fast function recognition within your organization

Teams Add-on

Collaborative reverse engineering

Others

Training courses

Expert-level courses for mastering complex reverse engineering techniques.

Help

FAQs

Commonly asked questions and their answers.

Documentation

Comprehensive user guides and technical documentation.

Our reseller partners

Information about our official reseller partners.

Malware analysis & Digital forensics

Digital forensic investigations occur when a system is compromised by malicious software.

Vulnerability research & Penetration testing

There is a strong incentive for software developers to attack their own software for the purpose of hardening security.

Intellectual property

Intellectual property is an essential asset of many companies.

Dynamic Analysis & Debugging

Disassembling a computer program can reveal a great deal about its behavior, but there are many ways to limit the usefulness of the raw disassembly.

Automotive security

Modern vehicles are rolling software ecosystems. They are now more reliant on firmware running on microcontrollers instead of pure hardware like in the past.

Interoperability

Information is rarely produced and consumed strictly inside an application.

See all case studies

Help

Pricing

Information on our product pricing and available plans.

FAQs

Commonly asked questions and their answers.

Our reseller partners

Information about our official reseller partners.

Learn & Connect

Documentation

Comprehensive user guides and technical documentation.

Blog

Insights, updates, and articles from the Hex-Rays team.

Forum

Participate in our forum for questions and community support.

Incentive

Beta Program

Be first to try new features and shape the outcome.

Bug Bounty

Report security vulnerabilities and earn rewards for your contributions.

CTF Sponsorship Program

You’re hosting a competition or competing on the world stage, we want to help.

Supercharge

Community plugins

Enhance IDA with a variety of plugins.

Help

FAQs

Commonly asked questions and their answers.

Download center

Access and download the latest versions of SDKs & utilities.

Our reseller partners

Information about our official reseller partners.

Company

About us

Discover Hex-Rays’ journey in revolutionizing binary analysis and supporting cybersecurity professionals worldwide.

Careers

Join our team of experts and contribute to advancing reverse engineering and cybersecurity tools.

Contact us

Do you need advice in selecting the right plan or managing your account?

Legal

Privacy policy

Learn how we prioritize and protect your data and ensure transparency in our practices.

Terms of use

Understand the guidelines and conditions for using our products and services effectively.

Cookies notice

Help

General questions?

Do you need advice in selecting the right plan or managing your account?

Need Support?

Open a support ticket to request assistance from our support team.

logo
  • Products
    IDA Pro

    State-of-the-art, binary code analysis tool

    IDA Home

    Affordable tool for reverse engineering hobbyists

    IDA Free

    Lightweight IDA at no cost to evaluate basic features

    IDA Classroom

    Powerful IDA for education providers and universities

    IDA Pro OEM

    The license you need to sell software or SaaS based on IDA

    Features

    Decompilers

    Easily readable pseudocode to enhance your binary analysis

    Private Lumina Add-on

    Fast function recognition within your organization

    Teams Add-on

    Collaborative reverse engineering

    Others

    Training courses

    Expert-level courses for mastering complex reverse engineering techniques.

  • Case studies
    Malware analysis & Digital forensics

    Digital forensic investigations occur when a system is compromised by malicious software.

    Vulnerability research & Penetration testing

    There is a strong incentive for software developers to attack their own software for the purpose of hardening security.

    Intellectual property

    Intellectual property is an essential asset of many companies.

    Dynamic Analysis & Debugging

    Disassembling a computer program can reveal a great deal about its behavior, but there are many ways to limit the usefulness of the raw disassembly.

    Automotive security

    Modern vehicles are rolling software ecosystems. They are now more reliant on firmware running on microcontrollers instead of pure hardware like in the past.

    Interoperability

    Information is rarely produced and consumed strictly inside an application.

    See all case studies
  • Resources

    Learn & Connect

    Documentation

    Comprehensive user guides and technical documentation.

    Blog

    Insights, updates, and articles from the Hex-Rays team.

    Forum

    Participate in our forum for questions and community support.

    Incentive

    Beta Program

    Be first to try new features and shape the outcome.

    Bug Bounty

    Report security vulnerabilities and earn rewards for your contributions.

    CTF Sponsorship Program

    You’re hosting a competition or competing on the world stage, we want to help.

    Supercharge

    Community plugins

    Enhance IDA with a variety of plugins.

  • Company

    Company

    About us

    Discover Hex-Rays’ journey in revolutionizing binary analysis and supporting cybersecurity professionals worldwide.

    Careers

    Join our team of experts and contribute to advancing reverse engineering and cybersecurity tools.

    Contact us

    Do you need advice in selecting the right plan or managing your account?

    Legal

    Privacy policy

    Learn how we prioritize and protect your data and ensure transparency in our practices.

    Terms of use

    Understand the guidelines and conditions for using our products and services effectively.

    Cookies notice
  • Pricing
My Account
  • There are no suggestions because the search field is empty.

Posts written by Igor Skochinsky

    Sep 30, 2022

    Igor’s tip of the week #108: Raw memory accesses in pseudocode

    Sometimes in pseudocode you may encounter strange-looking code:

    I
    Igor Skochinsky ✦ Posted: Sep 30, 2022
    Sep 23, 2022

    Igor’s tip of the week #107: Multiple return values

    The Hex-Rays decompiler was initially created to decompile C code, so its pseudocode output uses ...

    I
    Igor Skochinsky ✦ Posted: Sep 23, 2022
    Sep 16, 2022

    Igor’s tip of the week #106: Outlined functions

    The release notes for IDA 8.0 mention outlined functions. What are those and how to deal with them ...

    I
    Igor Skochinsky ✦ Posted: Sep 16, 2022
    Sep 9, 2022

    Igor’s tip of the week #105: Offsets with custom base

    We’ve already covered simple offsets, where an operand value or a data value matches an address in ...

    I
    Igor Skochinsky ✦ Posted: Sep 9, 2022
    Aug 26, 2022

    Igor’s tip of the week #104: Immediate search

    Immediate search is one of three main search types available in IDA. While not that known, it can ...

    I
    Igor Skochinsky ✦ Posted: Aug 26, 2022
    Aug 19, 2022

    Igor’s tip of the week #103: Sharing plugins between IDA installs

    As of the time of writing, IDA does not have a built-in plugin manager, so third-party plugins have ...

    I
    Igor Skochinsky ✦ Posted: Aug 19, 2022
    Aug 12, 2022

    Igor’s tip of the week #102: Resetting decompiler information

    While working with pseudocode, you may make various changes to it, for example:

    I
    Igor Skochinsky ✦ Posted: Aug 12, 2022
    Aug 5, 2022

    Igor’s tip of the week #101: Decompiling variadic function calls

    Variadic functions are functions which accept different number of arguments depending on the needs ...

    I
    Igor Skochinsky ✦ Posted: Aug 5, 2022
    Jul 29, 2022

    Igor’s tip of the week #100: Collapsing pseudocode parts

    When working with big functions in the decompiler, it may be useful to temporarily hide some parts ...

    I
    Igor Skochinsky ✦ Posted: Jul 29, 2022
    Prev
    7 8 9 10 11
    Next

    Stay up-to-date with the latest news!

    Stay up to date with the newest blog posts

    Products

    IDA Home
    IDA Pro
    IDA Free
    IDA Classroom
    IDA Pro OEM
    Private Lumina Add-on
    Teams Add-on
    Training courses

    Case studies

    Malware Analysis & Digital Forensics
    Vulnerability research & penetration testing
    Dynamic Analysis & Debugging
    Automotive Security
    Interoperability
    Software Assessments

    Classroom

    IDA Classroom Free
    Classroom discount for IDA Pro

    Resources

    Documentation
    Forum
    Blog
    Community plugins

    Pricing

    For organizations
    For individuals
    For education providers
    Our reseller partners

    Company

    About us
    Careers
    Privacy notice
    Terms of use
    Cookies notice
    Contact us

    Connect with the community on

    X Mastodon LinkedIn YouTube
    logo

    © 2025 Copyright Hex-Rays