-
Hiring several Reverse Engineers in Annapolis Junction, MD. Candidates please DM or reach out on LinkedIn: Victoria Heck.
#reverseEngineers#idapro#ollydbg#OSCP#parsonscyber#parsons#cybersecjobs#hackers -
#idapro discovery of the day: you can apply structure offsets to a selection of code
select code range, press T, select your structure, be amazed pic.twitter.com/yyypOG0pJa
-
Prikaži ovu nit
-
New Tutorial Video
Learn how to automaticaly decrypt #REvil strings with#IDAPro and python
The 4th part in our reverse engineering #ransomware deep-dive series.
https://youtu.be/l2P5CMH9TE0
#OpenAnalysisLive#Malware#tutorials -
Decompiler Internals: Microcode
#IDAPro#Decompiler#Microcode@idatipshttps://www.youtube.com/watch?v=T-YkhNElvng … -
New Tutorial Video
Intro to scripting with Python and #IDAPro
Learn how to automate resolving the #REvil#ransomware dynamic API calls
https://youtu.be/R4xJou6JsIE
#OpenAnalysisLive#MalwareAnalysis#IDAPython -
Just published my
#IDAPython scripts to reconstruct Microsoft COM-Code. Tested on#IDAPro v7.4 and Python v2+3 => Happy reversing! https://github.com/fboldewin/COM-Code-Helper/blob/master/README.md …#Malware#DFIRpic.twitter.com/wIbMcLUgHA
-
Auto Re - IDA PRO Auto-Renaming Plugin With Tagging Support http://j.mp/31rnUrT
#AutoRe#IDAPro#IDAPROPlugin#Taggingpic.twitter.com/t0XEpUgwB8
-
IDA Pro 7.4 has been released. Now with Python 3 support, new processor modules, structure editor, decompiler improvements and much more. https://www.hex-rays.com/products/ida/7.4/index.shtml …
#Reversing#Decompiler#IDAPRO#Debuggingpic.twitter.com/0nUJbRZNPT
-
Hex-Rays Plugin Contest 2019 results are up! Congrats
@EyalItkin,@danigargu,@jinmo123!#idapro#reversing#hexrays#idapython https://www.hex-rays.com/contests/2019/index.shtml#dereferencing … -
Hexext - A plugin for extending Hexrays 7.0 via microcode. It makes code prettier. It does a bunch of transformations at different phases of decompilation to clean it up, remove gotos, replace bitops, change bitwise lookup tables into comparisons. https://forum.reverse4you.org/t/hexext-a-plugin-for-extending-hexrays-7-0-via-microcode/10631 …
#idapro -
If you have switched to
#Ghidra from#IDAPro, and still want to fix missing labels in@x64dbg, use my new ghidra2x64dbg tool: https://github.com/utkonos/lst2x64dbg … It will extract symbols from an exported Symbol Table and generate an#x64dbg database.#DFIR#ReverseEngineeringPrikaži ovu nit -
IDA 7.3 released! With undo/redo after all these years. Also -> PowerPC x64 decompiler! I wish i had it half a year ago when i reversed a bunch of AIX PPC binaries. Complete list of features -> https://www.hex-rays.com/products/ida/7.3/index.shtml …
#IDApro#Hexrays#ReverseEngineeringpic.twitter.com/BuLnKVf8GE
-
I wanted to learn about writing scriptable plugins for
#IDAPro instead of just scripts. Here's the simplest plugin I could write that shows a single plugin with multiple actions (in case you've been wanting to learn the same): https://gist.github.com/cmatthewbrooks/7e0c5f4e81927b9d1d6acbb702db3bfc …Prikaži ovu nit -
Quickstart
#tutorial for#Ghidra: Solving#crackme without reading any assembly by@ghidraninja#GHIDRA#CyberSecurity#idapro#RSAC2019@RGB_Lights@DrJDrooghaag@Paula_Piccard@mkaplanPMP@Shirastweet@OttLegalRebels@archonsec@DivergentCIO#pentesthttps://www.youtube.com/watch?v=fTGTnrgjuGA …Prikaži ovu nit -
Check out my blog post: "Recovering Stackstrings Using Emulation with ironstrings". The script is powered by flare-emu which combines
@unicorn_engine and#idapro. https://www.fireeye.com/blog/threat-research/2019/02/recovering-stackstrings-using-emulation-with-ironstrings.html … -
UPDATE: Just finished working on main function recognition feature. Try it.
@x64dbg and#IDAPro plugins are ready. idenLib - Library Function Identification https://github.com/secrary/idenLib pic.twitter.com/QIqHEpNnTm -
Library Function Identification - idenLib https://github.com/secrary/idenLib also
@x64dbg and#IDAPro plugins
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.