We are excited to announce the upcoming release of IDA version 9.0! This new version introduces major changes to the C++ SDK and IDAPython API, and we want to ensure you are prepared for the transition. To support you in updating your plugins and scripts, we have released new documentation that includes a comprehensive Porting […]
This is a guest entry written by Arnaud Gatignol and Julien Staszewski from the THALIUM team. The views and opinions expressed in this blog post are solely those of the authors and do not necessarily reflect the views or opinions of Hex-Rays. Any technical or maintenance issues regarding the code herein should be directed […]
This is a guest entry written by Martin Perrier and Louis Jacotot from Synacktiv. The views and opinions expressed in this blog post are solely those of the authors and do not necessarily reflect the views or opinions of Hex-Rays. Any technical or maintenance issues regarding the code herein should be directed to the […]
This is a guest entry written by David Catalán from Outpost24. His views and opinions are his own and not those of Hex-Rays. Any technical or maintenance issues regarding the code herein should be directed to the author.
Software reverse engineering involves working with a wide variety of processor architectures, both real and virtual. Thus, having […]
This is a guest entry written by Alexander Hanel from CrowdStrike. His views and opinions are his own and not those of Hex-Rays. Any technical or maintenance issues regarding the code herein should be directed to the author.
Msdocviewer: A simple tool for viewing Microsoft’s technical specifications
An invaluable resource when reverse engineering Portable Executable (PE) binaries […]
This is a guest entry written by Baptiste Verstraeten from the Thalium Team. His views and opinions are his own and not those of Hex-Rays. Any technical or maintenance issues regarding the code herein should be directed to the author.
The Symless plugin aims to simplify the process of retrieving and defining structures, classes, and virtual […]
Halloween is approaching, and we’ve decided to celebrate it by launching the #MyCreepyCodeContest. Whether you are a seasoned reverser or just an enthusiast, our #MyCreepyCodeContest invites you to dig up and share the most spine-chilling pieces of code you’ve encountered in the wild.
Everyone is welcome to participate, regardless of experience. The goal is to…well, to […]
This is a guest entry written by Sergejs Harlamovs from IKARUS Security Software GmbH. His views and opinions are his own and not those of Hex-Rays. Any technical or maintenance issues regarding the code herein should be directed to the author.
IdaClu: Finding clues without knowing what to seek
IdaClu, as the name suggests, is about […]
This is a guest entry written by Holger Unterbrink from Cisco Talos. His views and opinions are his own and not those of Hex-Rays. Any technical or maintenance issues regarding the code herein should be directed to the author.
Adversaries are increasingly writing malware in programming languages such as Go, Rust, or Nim, likely because these […]
This is a guest entry written by Elias Bachaalany. His views and opinions are his own and not those of Hex-Rays. Any questions with regards to the content of this blog post should be directed to the author.
Introduction
During the IDA Advanced training, I get asked a lot about how to set up the