home.social

#idapro — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #idapro, aggregated by home.social.

  1. I pushed an early version of REshare IDA exporter:

    https://github.com/v-p-b/reshare-ida/blob/main/reshare-ida-export.py

    I don't have time to run x-platform tests right now, but if you do I'd appreciate any bug reports!

    #ReverseEngineering #IDA #IDAPro
  2. C++ macro for x64 programs that breaks ida hex-rays decompiler tool.

    https://github.com/android1337/brkida

    "This project exploits the fact that IDA decompiler fails when it encounters a stack access on a pointer that's too big."

    #IDA #IDAPro #HexRays
  3. The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:

    exploitreversing.com/2025/03/1

    I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA @HexRaysSA for their constant and uninterrupted support, which have helped me write these articles.

    I hope you enjoy reading it and have an excellent day.

    #hypervisor #hyperv #architecture #cybersecurity #research #internals #idapro #informationsecurity #microsoft

  4. The fourth article (126 pages) of the Exploiting Reversing Series (ERS) is available on:

    exploitreversing.com/2025/02/0

    I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me write these articles.

    The fifth article (ERS 05) will be released soon. Stay tuned.

    I hope you enjoy reading it and have an excellent day.

    #apple #ios #macOS #architecture #cybersecurity #research #internals #vulnerability #idapro #informationsecurity

  5. The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:

    exploitreversing.com/2025/01/0

    I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.

    Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).

    Have a great day.

    #windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis

  6. The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:

    exploitreversing.com/2025/01/0

    I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.

    Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).

    Have a great day.

    #windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis

  7. [case study]

    IDA Pro comes with ten different debuggers out of the box. They are all configurable, programmable, and extensible.

    👉 Check out how the various teams at Google use IDA Pro in their debugging tactics.
    hex-rays.com/case-studies/dyna

    #IDAPro #hexrays #reverseengineering #cybersecurity

  8. [events]
    Thank you @codeblue_jp for a great event last week!

    Our attending team enjoyed and experienced everything from the VIP Opening Party, sessions highlighting #IDAPro, CTF challenges for women w/ global teams, to amazing views at the After Party.

    We will def be back next year!

    #securityconference #cybersecurity #codeblue #reverseengineering #hexrays

  9. Apparently, @HexRaysSA is finally going down the drain. Their whole new licensing process does not work, support sucks, i'm currently just burning money 💸every day for not being able to work on my project. This is not the toolchain I'd like to depend on anymore. Probably it's time to say good-bye, after > 20 years of being user and mentor of IDA Pro & Co. #hexrays #idapro #RE

  10. Are you at Black Hat USA 2024? Make sure you come by our booth #3003 and learn more about IDA 9.0, play a game or a CTF 👉 silver coins involved 🤩, and get 30% off on all our 2024 trainings!

    #idapro #hexrays #bhusa2024

  11. Hex-Rays is in Vegas for #BlackHat! Visit us at booth #3003 to see the exciting improvements in the upcoming IDA 9.0 and get 30% off all our 2024 trainings!

    #idapro #hexrays #bhusa2024

  12. New Tutorial Alert 🚨 We’ve just published another great video for those who begin with IDA. Learn more about Comments and how to use them 🌐 youtu.be/zUo5BnuqfDQ

    #IDAProTutorials #IDAPro #hexrays #LearningIDA

  13. 🤩 We’ve got some big news to share 🤩 IDA 8.4 is now released 🚀Get ready for an improved, polished, and much more convenient version! Read the details and get it now 🌐 hex-rays.com/blog/introducing-

    #IDAPro #HexRays #NewRelease

  14. 🎇 We are kicking off 2024, geared up for a year full of innovation and cool new features! Big thanks to our incredible community for the energy and continuous support! 🫶 Happy New Year to all! 🎊

    #hexrays #idapro #HappyNewYear

  15. The holiday season is the perfect time to improve your IDA skills. If you are a newbie to IDA, then do not miss out on our new video tutorial 🌐 youtu.be/_CkyWaInIjM

    #IDAProTutorials #IDAPro #hexrays #LearningIDA

  16. We’ve covered the essential Search options in our new #IDAProTutorial. If you haven’t got much experience with IDA, then this video might be useful for you 🌐 youtu.be/_mOUcYXi1Pg

    #IDAProTutorials #IDAPro #hexrays #LearningIDA

  17. You really got to be careful with Lumina when it comes to C++.

    In my case, it re-labeled 100s of functions as a method of CInsertMenuEdit (I can't remember the name, I think it was a constructor). This caused that type to propagate in the decompiler up through some virtual functions.

    While creating the appropriate vtable structures for those classes, I was getting errors because the type CInsertMenuEdit didn't exist in the Local Types (also a weird thing about Lumina). This is when I noticed what had happened. It was a simple function, with a pattern that could easily match any number of C++ functions. Guessing that's the cause of the FP.

    But also, while fixing the issue, I noticed that Lumina also overwrote mangled function names from the exports (which also had valuable type and name information) with TreeCtrlBookMark methods, and 100s of other unnamed functions as GlobalBBEventHandler and HTTPComms:dstr_2. Needless to say, I reverted everything Lumina had labeled.

    Annoyed at the wasted time, but lesson learned: Alt-F12 not F12

    #reverseengineering #idapro #hexrays

  18. Attention, IDA Beginners! We’ve uploaded a new #IDAProTutorial covering one of the fundamental operations – Jump to Address. Watch it now 🌐 youtu.be/--EZ-kFOM3A

    #IDAProTutorials #IDAPro #hexrays #LearningIDA

  19. Just published! Check out our new IDA Pro Video Tutorial that concludes the topic of IDA Windows. If you are new to IDA, then this video is a must-see 🌐 youtu.be/mLR4G8ax1Yc

    #IDAProTutorials #IDAPro #hexrays #LearningIDA

  20. Check out our latest IDA Pro video tutorial! If you are new to IDA, this video will help you better understand some of the IDA Windows. Watch it now 🌐 youtu.be/v8TAg873d_k

    #IDAProTutorials #IDAPro #hexrays #LearningIDA

  21. 📢 Don’t forget to sign up for one of our advanced hands-on #infosec trainings! The first week of #RETURN23XPLOIT is only a few days away. Our trainings offer hands-on instruction from top industry experts. In week 1, learn #Diffing, #ExploitDev, #ARM64, #ReverseEngineering, #IDAPro & more. Don't miss out!

    ringzer0.training/

    #cybersecurity #training

  22. A rich #training #offer at BSides Milano we have top-notch trainings, in some case for the first time in #Italy! All #in-person! The #event will be held from 4 to 8 July 2023. From 4 to 7 we will be focus on #learnitall on the 8 we will deep dive in our #amazing #conference. Ticket will be available from tonight for the trainings. We have an early bird rate until 30th April.
    Are you ready? We are!! join our group SecurityBsidesItalia #linkedin or on #discord lnkd.in/dBu7wkJG for detailed info! #cyber #threatintelligence #threatintel #cloud #redteaming #redteam #blueteam #threathunting #exploitation #secureboot #TTE #multicloud #hybridcloud #voip #Linux #Windows #LTE #baseband #deception #detection #evasion #edr #BSML23 #AWS #Azure #AzureAD #GCP #devops #cicd #RTOS #FalseFlag #HoneyNet #IDAPro #Python #reverseengineering #Ghidra #network #MITRE #TTPs #persistence #commandandcontrol #lateralmovement #osint #obfuscation #malware #malwareanalysis .
    Reserve your your spot!! lnkd.in/dZf-yyPv

  23. A rich #training #offer at BSides Milano we have top-notch trainings, in some case for the first time in #Italy! All #in-person! The #event will be held from 4 to 8 July 2023. From 4 to 7 we will be focus on #learnitall on the 8 we will deep dive in our #amazing #conference. Ticket will be available from tonight for the trainings. We have an early bird rate until 30th April.
    Are you ready? We are!! join our group SecurityBsidesItalia #linkedin or on #discord lnkd.in/dBu7wkJG for detailed info! #cyber #threatintelligence #threatintel #cloud #redteaming #redteam #blueteam #threathunting #exploitation #secureboot #TTE #multicloud #hybridcloud #voip #Linux #Windows #LTE #baseband #deception #detection #evasion #edr #BSML23 #AWS #Azure #AzureAD #GCP #devops #cicd #RTOS #FalseFlag #HoneyNet #IDAPro #Python #reverseengineering #Ghidra #network #MITRE #TTPs #persistence #commandandcontrol #lateralmovement #osint #obfuscation #malware #malwareanalysis .
    Reserve your your spot!! lnkd.in/dZf-yyPv

  24. A rich #training #offer at BSides Milano we have top-notch trainings, in some case for the first time in #Italy! All #in-person! The #event will be held from 4 to 8 July 2023. From 4 to 7 we will be focus on #learnitall on the 8 we will deep dive in our #amazing #conference. Ticket will be available from tonight for the trainings. We have an early bird rate until 30th April.
    Are you ready? We are!! join our group SecurityBsidesItalia #linkedin or on #discord lnkd.in/dBu7wkJG for detailed info! #cyber #threatintelligence #threatintel #cloud #redteaming #redteam #blueteam #threathunting #exploitation #secureboot #TTE #multicloud #hybridcloud #voip #Linux #Windows #LTE #baseband #deception #detection #evasion #edr #BSML23 #AWS #Azure #AzureAD #GCP #devops #cicd #RTOS #FalseFlag #HoneyNet #IDAPro #Python #reverseengineering #Ghidra #network #MITRE #TTPs #persistence #commandandcontrol #lateralmovement #osint #obfuscation #malware #malwareanalysis .
    Reserve your your spot!! lnkd.in/dZf-yyPv

  25. A rich #training #offer at BSides Milano we have top-notch trainings, in some case for the first time in #Italy! All #in-person! The #event will be held from 4 to 8 July 2023. From 4 to 7 we will be focus on #learnitall on the 8 we will deep dive in our #amazing #conference. Ticket will be available from tonight for the trainings. We have an early bird rate until 30th April.
    Are you ready? We are!! join our group SecurityBsidesItalia #linkedin or on #discord lnkd.in/dBu7wkJG for detailed info! #cyber #threatintelligence #threatintel #cloud #redteaming #redteam #blueteam #threathunting #exploitation #secureboot #TTE #multicloud #hybridcloud #voip #Linux #Windows #LTE #baseband #deception #detection #evasion #edr #BSML23 #AWS #Azure #AzureAD #GCP #devops #cicd #RTOS #FalseFlag #HoneyNet #IDAPro #Python #reverseengineering #Ghidra #network #MITRE #TTPs #persistence #commandandcontrol #lateralmovement #osint #obfuscation #malware #malwareanalysis .
    Reserve your your spot!! lnkd.in/dZf-yyPv

  26. A rich #training #offer at BSides Milano we have top-notch trainings, in some case for the first time in #Italy! All #in-person! The #event will be held from 4 to 8 July 2023. From 4 to 7 we will be focus on #learnitall on the 8 we will deep dive in our #amazing #conference. Ticket will be available from tonight for the trainings. We have an early bird rate until 30th April.
    Are you ready? We are!! join our group SecurityBsidesItalia #linkedin or on #discord lnkd.in/dBu7wkJG for detailed info! #cyber #threatintelligence #threatintel #cloud #redteaming #redteam #blueteam #threathunting #exploitation #secureboot #TTE #multicloud #hybridcloud #voip #Linux #Windows #LTE #baseband #deception #detection #evasion #edr #BSML23 #AWS #Azure #AzureAD #GCP #devops #cicd #RTOS #FalseFlag #HoneyNet #IDAPro #Python #reverseengineering #Ghidra #network #MITRE #TTPs #persistence #commandandcontrol #lateralmovement #osint #obfuscation #malware #malwareanalysis .
    Reserve your your spot!! lnkd.in/dZf-yyPv

  27. Our new decompiler plugin is now available! gooMBA is here to help when you’re struggling with a ‘'mixed boolean arithmetic”-obfuscated binary. Read more 🌐 hex-rays.com/blog/deobfuscatio

    #HexRays #HexRaysDecompiler #IDAPro

  28. Wow, we’ve just created our Mastodon account, and it is time for a short #introduction

    Hex-Rays is a hi-tech company focusing on #binaryanalysis software. Our main products are #IDAPro, #IDATeams, #IDAFree, and the #hexraysdecompiler.

    We are excited to be here, and our intention is to publish valuable and practical resources/information that could help you in your daily work. Feel free to follow us and say “hello”!

    #reverseengineering #infosec #malwareanalysis #hexrays

  29. CW: SFW! Just a lengthy post about an excellent, reverse-engineering piece of software for computer users that I recommended to software developers.

    Let me start with that I'm NOT A SHILL, I'm simply stating my own preferences for a program that I have come to very much enjoy in the past few weeks/months, despite the fact that it has been developed by a tyrannically corrupt, capitalistic-minded government (my words and not theirs).

    I've recently made #Ghidra a serious part of my regularly used development toolkit, particularly when it comes to coding with C/C++ despite the fact that this particular piece of software has been developed by the NSA themselves in the United States.

    The potential security concerns are simply outweighed by the immense amount of useful, reverse engineering features that #Ghidra provides to the average software developer, without having to invest a small mortgage into something alternative like #IDAPro, which would've been the more traditional choice.

    So yeah! I think anyone who is serious about developing software, particularly if it's with code that #compiles natively to machine code, that they take up learning and/or trying out Ghidra!

    The list of features is too large to list but my favorite would have to be the version tracking provided, so you can easily make comparisons between different versions of software at a glance, whilst reverse-engineered, and see what a close-sourced developer has been up to in their time. Or simply see for yourself what a change in a LOC has accomplished for you!

    I haven't even mentioned the best part and that is the fact that the program features an #ouroboros #Dragon eating its own tail while breathing #binary #code as its breath weapon! Just have a look at the attachment, it really does look as cool as it sounds.

    ghidra-sre.org/

    #ReverseEngineering #ReverseEngineered #Programming #Software