#idapro — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #idapro, aggregated by home.social.
-
I pushed an early version of REshare IDA exporter:
https://github.com/v-p-b/reshare-ida/blob/main/reshare-ida-export.py
I don't have time to run x-platform tests right now, but if you do I'd appreciate any bug reports!
#ReverseEngineering #IDA #IDAPro -
PSA: I’ll be at #codeblue_jp next week in Tokyo. Website: https://codeblue.jp/
#reverseengineering #idapro #hexrays #idapython -
C++ macro for x64 programs that breaks ida hex-rays decompiler tool.
https://github.com/android1337/brkida
"This project exploits the fact that IDA decompiler fails when it encounters a stack access on a pointer that's too big."
#IDA #IDAPro #HexRays -
The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:
https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/
I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA @HexRaysSA for their constant and uninterrupted support, which have helped me write these articles.
I hope you enjoy reading it and have an excellent day.
#hypervisor #hyperv #architecture #cybersecurity #research #internals #idapro #informationsecurity #microsoft
-
The fourth article (126 pages) of the Exploiting Reversing Series (ERS) is available on:
https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/
I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me write these articles.
The fifth article (ERS 05) will be released soon. Stay tuned.
I hope you enjoy reading it and have an excellent day.
#apple #ios #macOS #architecture #cybersecurity #research #internals #vulnerability #idapro #informationsecurity
-
The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:
https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/
I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.
Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).
Have a great day.
#windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis
-
The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:
https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/
I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.
Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).
Have a great day.
#windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis
-
[case study]
IDA Pro comes with ten different debuggers out of the box. They are all configurable, programmable, and extensible.
👉 Check out how the various teams at Google use IDA Pro in their debugging tactics.
https://hex-rays.com/case-studies/dynamic-analysis-and-debugging -
[events]
Thank you @codeblue_jp for a great event last week!Our attending team enjoyed and experienced everything from the VIP Opening Party, sessions highlighting #IDAPro, CTF challenges for women w/ global teams, to amazing views at the After Party.
We will def be back next year!
#securityconference #cybersecurity #codeblue #reverseengineering #hexrays
-
Apparently, @HexRaysSA is finally going down the drain. Their whole new licensing process does not work, support sucks, i'm currently just burning money 💸every day for not being able to work on my project. This is not the toolchain I'd like to depend on anymore. Probably it's time to say good-bye, after > 20 years of being user and mentor of IDA Pro & Co. #hexrays #idapro #RE
-
Are you at Black Hat USA 2024? Make sure you come by our booth #3003 and learn more about IDA 9.0, play a game or a CTF 👉 silver coins involved 🤩, and get 30% off on all our 2024 trainings!
-
Hex-Rays is in Vegas for #BlackHat! Visit us at booth #3003 to see the exciting improvements in the upcoming IDA 9.0 and get 30% off all our 2024 trainings!
-
New Tutorial Alert 🚨 We’ve just published another great video for those who begin with IDA. Learn more about Comments and how to use them 🌐 https://youtu.be/zUo5BnuqfDQ
-
🤩 We’ve got some big news to share 🤩 IDA 8.4 is now released 🚀Get ready for an improved, polished, and much more convenient version! Read the details and get it now 🌐 https://hex-rays.com/blog/introducing-ida-8-4-key-features-and-enhancements/?utm_source=Social-Media-Post&utm_medium=Mastodon&utm_campaign=IDA-8-4
-
🎇 We are kicking off 2024, geared up for a year full of innovation and cool new features! Big thanks to our incredible community for the energy and continuous support! 🫶 Happy New Year to all! 🎊
-
The holiday season is the perfect time to improve your IDA skills. If you are a newbie to IDA, then do not miss out on our new video tutorial 🌐 https://youtu.be/_CkyWaInIjM
-
We’ve covered the essential Search options in our new #IDAProTutorial. If you haven’t got much experience with IDA, then this video might be useful for you 🌐 https://youtu.be/_mOUcYXi1Pg
-
Are you starting with #IDA? Don’t miss out on our newly published #IDAProTutorial, covering all Jump operations! Watch it here 🌐 https://youtu.be/uKu3T5Rt1F8
-
You really got to be careful with Lumina when it comes to C++.
In my case, it re-labeled 100s of functions as a method of CInsertMenuEdit (I can't remember the name, I think it was a constructor). This caused that type to propagate in the decompiler up through some virtual functions.
While creating the appropriate vtable structures for those classes, I was getting errors because the type CInsertMenuEdit didn't exist in the Local Types (also a weird thing about Lumina). This is when I noticed what had happened. It was a simple function, with a pattern that could easily match any number of C++ functions. Guessing that's the cause of the FP.
But also, while fixing the issue, I noticed that Lumina also overwrote mangled function names from the exports (which also had valuable type and name information) with TreeCtrlBookMark methods, and 100s of other unnamed functions as GlobalBBEventHandler and HTTPComms:dstr_2. Needless to say, I reverted everything Lumina had labeled.
Annoyed at the wasted time, but lesson learned: Alt-F12 not F12
-
Did you know you can win a cool cap by publishing your #plugin on our #PluginRepository? Read more about our #PluginSubmissionInitiative 🌐 https://hex-rays.com/blog/the-plugin-submission-initiative/?utm_source=Social-Media-Post&utm_medium=Mastodon&utm_campaign=plugin-submission-initiative-03
-
Attention, IDA Beginners! We’ve uploaded a new #IDAProTutorial covering one of the fundamental operations – Jump to Address. Watch it now 🌐 https://youtu.be/--EZ-kFOM3A
-
Want to win an amazing F5 cap? Take part in our #PluginSubmissionInitiative! Let’s put all #IDAPlugins in one place and make our #PluginRepository more valuable to IDA users. More info about the campaign 🌐 https://hex-rays.com/blog/the-plugin-submission-initiative/?utm_source=Social-Media-Post&utm_medium=Mastodon&utm_campaign=plugin-submission-initiative-02
-
We are excited to kick off our #PluginSubmissionInitiative 🤩 It aims to encourage contributions to our #PluginRepository and make it more valuable to IDA users. Join our campaign and take the chance to win an amazing gift 🌐 https://hex-rays.com/blog/the-plugin-submission-initiative/?utm_source=Social-Media-Post&utm_medium=Mastodon&utm_campaign=plugin-submission-initiative-01
-
Are you puzzled by the “Function frame is wrong” error? See what you need to do 🌐 https://hex-rays.com/blog/igors-tip-of-the-week-151-fixing-function-frame-is-wrong/?utm_source=Social-Media-Post&utm_medium=Mastodon&utm_campaign=Igor-Tip-151
-
Just published! Check out our new IDA Pro Video Tutorial that concludes the topic of IDA Windows. If you are new to IDA, then this video is a must-see 🌐 https://youtu.be/mLR4G8ax1Yc
-
Check out our latest IDA Pro video tutorial! If you are new to IDA, this video will help you better understand some of the IDA Windows. Watch it now 🌐 https://youtu.be/v8TAg873d_k
-
📢 Don’t forget to sign up for one of our advanced hands-on #infosec trainings! The first week of #RETURN23XPLOIT is only a few days away. Our trainings offer hands-on instruction from top industry experts. In week 1, learn #Diffing, #ExploitDev, #ARM64, #ReverseEngineering, #IDAPro & more. Don't miss out!
-
A rich #training #offer at BSides Milano we have top-notch trainings, in some case for the first time in #Italy! All #in-person! The #event will be held from 4 to 8 July 2023. From 4 to 7 we will be focus on #learnitall on the 8 we will deep dive in our #amazing #conference. Ticket will be available from tonight for the trainings. We have an early bird rate until 30th April.
Are you ready? We are!! join our group SecurityBsidesItalia #linkedin or on #discord https://lnkd.in/dBu7wkJG for detailed info! #cyber #threatintelligence #threatintel #cloud #redteaming #redteam #blueteam #threathunting #exploitation #secureboot #TTE #multicloud #hybridcloud #voip #Linux #Windows #LTE #baseband #deception #detection #evasion #edr #BSML23 #AWS #Azure #AzureAD #GCP #devops #cicd #RTOS #FalseFlag #HoneyNet #IDAPro #Python #reverseengineering #Ghidra #network #MITRE #TTPs #persistence #commandandcontrol #lateralmovement #osint #obfuscation #malware #malwareanalysis .
Reserve your your spot!! https://lnkd.in/dZf-yyPv -
A rich #training #offer at BSides Milano we have top-notch trainings, in some case for the first time in #Italy! All #in-person! The #event will be held from 4 to 8 July 2023. From 4 to 7 we will be focus on #learnitall on the 8 we will deep dive in our #amazing #conference. Ticket will be available from tonight for the trainings. We have an early bird rate until 30th April.
Are you ready? We are!! join our group SecurityBsidesItalia #linkedin or on #discord https://lnkd.in/dBu7wkJG for detailed info! #cyber #threatintelligence #threatintel #cloud #redteaming #redteam #blueteam #threathunting #exploitation #secureboot #TTE #multicloud #hybridcloud #voip #Linux #Windows #LTE #baseband #deception #detection #evasion #edr #BSML23 #AWS #Azure #AzureAD #GCP #devops #cicd #RTOS #FalseFlag #HoneyNet #IDAPro #Python #reverseengineering #Ghidra #network #MITRE #TTPs #persistence #commandandcontrol #lateralmovement #osint #obfuscation #malware #malwareanalysis .
Reserve your your spot!! https://lnkd.in/dZf-yyPv -
A rich #training #offer at BSides Milano we have top-notch trainings, in some case for the first time in #Italy! All #in-person! The #event will be held from 4 to 8 July 2023. From 4 to 7 we will be focus on #learnitall on the 8 we will deep dive in our #amazing #conference. Ticket will be available from tonight for the trainings. We have an early bird rate until 30th April.
Are you ready? We are!! join our group SecurityBsidesItalia #linkedin or on #discord https://lnkd.in/dBu7wkJG for detailed info! #cyber #threatintelligence #threatintel #cloud #redteaming #redteam #blueteam #threathunting #exploitation #secureboot #TTE #multicloud #hybridcloud #voip #Linux #Windows #LTE #baseband #deception #detection #evasion #edr #BSML23 #AWS #Azure #AzureAD #GCP #devops #cicd #RTOS #FalseFlag #HoneyNet #IDAPro #Python #reverseengineering #Ghidra #network #MITRE #TTPs #persistence #commandandcontrol #lateralmovement #osint #obfuscation #malware #malwareanalysis .
Reserve your your spot!! https://lnkd.in/dZf-yyPv -
A rich #training #offer at BSides Milano we have top-notch trainings, in some case for the first time in #Italy! All #in-person! The #event will be held from 4 to 8 July 2023. From 4 to 7 we will be focus on #learnitall on the 8 we will deep dive in our #amazing #conference. Ticket will be available from tonight for the trainings. We have an early bird rate until 30th April.
Are you ready? We are!! join our group SecurityBsidesItalia #linkedin or on #discord https://lnkd.in/dBu7wkJG for detailed info! #cyber #threatintelligence #threatintel #cloud #redteaming #redteam #blueteam #threathunting #exploitation #secureboot #TTE #multicloud #hybridcloud #voip #Linux #Windows #LTE #baseband #deception #detection #evasion #edr #BSML23 #AWS #Azure #AzureAD #GCP #devops #cicd #RTOS #FalseFlag #HoneyNet #IDAPro #Python #reverseengineering #Ghidra #network #MITRE #TTPs #persistence #commandandcontrol #lateralmovement #osint #obfuscation #malware #malwareanalysis .
Reserve your your spot!! https://lnkd.in/dZf-yyPv -
A rich #training #offer at BSides Milano we have top-notch trainings, in some case for the first time in #Italy! All #in-person! The #event will be held from 4 to 8 July 2023. From 4 to 7 we will be focus on #learnitall on the 8 we will deep dive in our #amazing #conference. Ticket will be available from tonight for the trainings. We have an early bird rate until 30th April.
Are you ready? We are!! join our group SecurityBsidesItalia #linkedin or on #discord https://lnkd.in/dBu7wkJG for detailed info! #cyber #threatintelligence #threatintel #cloud #redteaming #redteam #blueteam #threathunting #exploitation #secureboot #TTE #multicloud #hybridcloud #voip #Linux #Windows #LTE #baseband #deception #detection #evasion #edr #BSML23 #AWS #Azure #AzureAD #GCP #devops #cicd #RTOS #FalseFlag #HoneyNet #IDAPro #Python #reverseengineering #Ghidra #network #MITRE #TTPs #persistence #commandandcontrol #lateralmovement #osint #obfuscation #malware #malwareanalysis .
Reserve your your spot!! https://lnkd.in/dZf-yyPv -
Level up your #cybersecurity skills with #RETURN23XPLOIT! Our trainings offer hands-on instruction from top industry experts. In week 1, learn #Diffing, #ExploitDev, #ARM64, #ReverseEngineering, #IDAPro & more. Don't miss out!
-
Our new decompiler plugin is now available! gooMBA is here to help when you’re struggling with a ‘'mixed boolean arithmetic”-obfuscated binary. Read more 🌐 https://hex-rays.com/blog/deobfuscation-with-goomba/?utm_source=Social-Media-Post&utm_medium=Mastodon&utm_campaign=blog-post-goomba
-
Wow, we’ve just created our Mastodon account, and it is time for a short #introduction…
Hex-Rays is a hi-tech company focusing on #binaryanalysis software. Our main products are #IDAPro, #IDATeams, #IDAFree, and the #hexraysdecompiler.
We are excited to be here, and our intention is to publish valuable and practical resources/information that could help you in your daily work. Feel free to follow us and say “hello”!
-
CW: SFW! Just a lengthy post about an excellent, reverse-engineering piece of software for computer users that I recommended to software developers.
Let me start with that I'm NOT A SHILL, I'm simply stating my own preferences for a program that I have come to very much enjoy in the past few weeks/months, despite the fact that it has been developed by a tyrannically corrupt, capitalistic-minded government (my words and not theirs).
I've recently made #Ghidra a serious part of my regularly used development toolkit, particularly when it comes to coding with C/C++ despite the fact that this particular piece of software has been developed by the NSA themselves in the United States.
The potential security concerns are simply outweighed by the immense amount of useful, reverse engineering features that #Ghidra provides to the average software developer, without having to invest a small mortgage into something alternative like #IDAPro, which would've been the more traditional choice.
So yeah! I think anyone who is serious about developing software, particularly if it's with code that #compiles natively to machine code, that they take up learning and/or trying out Ghidra!
The list of features is too large to list but my favorite would have to be the version tracking provided, so you can easily make comparisons between different versions of software at a glance, whilst reverse-engineered, and see what a close-sourced developer has been up to in their time. Or simply see for yourself what a change in a LOC has accomplished for you!
I haven't even mentioned the best part and that is the fact that the program features an #ouroboros #Dragon eating its own tail while breathing #binary #code as its breath weapon! Just have a look at the attachment, it really does look as cool as it sounds.
#ReverseEngineering #ReverseEngineered #Programming #Software