Latest available version: IDA and decompilers v8.4.240320sp1 see all releases
Hex-Rays logo State-of-the-art binary code analysis tools
email icon


This training focuses on writing file format loaders and processor modules to extend IDA's functionality. Participants will perform prototyping using IDAPython and then write a full-blown implementation for a custom executable image format and processor architecture using the native C++ SDK.

Who would benefit from this course?

This course is an excellent option for experienced IDA Pro users aiming to enhance IDA through direct coding in IDA Python and the C++ SDK.

What you will learn

Students will learn how to build tools that help IDA recognize new file types, scripting using IDAPython, and then dive deep into programming with the IDA C++ SDK.


Proficiency in IDA Pro, good knowledge of Python and C++



Date & Duration

Sept 18-19, 2024 10:00 UTC-4 (New York) - 1.5 days

About your trainer

Julian Kirsch has been using IDA Pro for his daily reverse engineering works for more than 15 years. At Hex-Rays, he works at the intersection of product, research, and development. He is an experienced instructor of reverse engineering classes, usually centered around deobfuscation and program analysis topics, with a focus on targets found in the real world. Julian graduated from TU Munich, where he has taught hands-on courses on reverse engineering and binary exploitation to students for six years. In his limited spare time, he organizes and participates in capture the flag contests alongside his teammates from hxp.

Advanced Training

1.5 days
Module 3: Advanced Programming for IDA with IDA Python and C++ SDK
Trainer: Julian Kirsch
EUR/USD 1599
Register now

All registrations for this training session should be made
before Sept 17, 2024 15:00 UTC+2