-
Hexext - A plugin for extending Hexrays 7.0 via microcode. It makes code prettier. It does a bunch of transformations at different phases of decompilation to clean it up, remove gotos, replace bitops, change bitwise lookup tables into comparisons. https://forum.reverse4you.org/t/hexext-a-plugin-for-extending-hexrays-7-0-via-microcode/10631 …
#idapro -
Check out my blog post: "Recovering Stackstrings Using Emulation with ironstrings". The script is powered by flare-emu which combines
@unicorn_engine and#idapro. https://www.fireeye.com/blog/threat-research/2019/02/recovering-stackstrings-using-emulation-with-ironstrings.html … -
Library Function Identification - idenLib https://github.com/secrary/idenLib also
@x64dbg and#IDAPro plugins -
Just published my
#IDAPython scripts to reconstruct Microsoft COM-Code. Tested on#IDAPro v7.4 and Python v2+3 => Happy reversing! https://github.com/fboldewin/COM-Code-Helper/blob/master/README.md …#Malware#DFIRpic.twitter.com/wIbMcLUgHA
-
UPDATE: Just finished working on main function recognition feature. Try it.
@x64dbg and#IDAPro plugins are ready. idenLib - Library Function Identification https://github.com/secrary/idenLib pic.twitter.com/QIqHEpNnTm -
Nice post from .
@theRealJohnPeng describing how to use IDAPython to decrypt the stack strings in#Gootkit malware. Great introduction for anyone interested in getting started with IDA scripting : ) http://johnpeng47.com/2018/08/14/decrypting-strings-in-the-gootkit-with-idapython/ …#malware#IDAPro#IDAPython -
If your org uses
#idapro floating licenses, this may help to improve their utilization: https://github.com/google/idaidle -
Quickstart
#tutorial for#Ghidra: Solving#crackme without reading any assembly by@ghidraninja#GHIDRA#CyberSecurity#idapro#RSAC2019@RGB_Lights@DrJDrooghaag@Paula_Piccard@mkaplanPMP@Shirastweet@OttLegalRebels@archonsec@DivergentCIO#pentesthttps://www.youtube.com/watch?v=fTGTnrgjuGA …Prikaži ovu nit -
New Tutorial Video
Intro to scripting with Python and #IDAPro
Learn how to automate resolving the #REvil#ransomware dynamic API calls
https://youtu.be/R4xJou6JsIE
#OpenAnalysisLive#MalwareAnalysis#IDAPython -
#HeapViewer - An#IDAPro Plugin To Examine The#Glibc Heap, Focused On#Exploit Development https://goo.gl/Bfonkz pic.twitter.com/dWzOrzbapg
-
If you have switched to
#Ghidra from#IDAPro, and still want to fix missing labels in@x64dbg, use my new ghidra2x64dbg tool: https://github.com/utkonos/lst2x64dbg … It will extract symbols from an exported Symbol Table and generate an#x64dbg database.#DFIR#ReverseEngineeringPrikaži ovu nit -
Ever have one of those days where the ladies won't leave you alone?
#IDAPro pic.twitter.com/nEPRWCey13 -
IDA 7.3 released! With undo/redo after all these years. Also -> PowerPC x64 decompiler! I wish i had it half a year ago when i reversed a bunch of AIX PPC binaries. Complete list of features -> https://www.hex-rays.com/products/ida/7.3/index.shtml …
#IDApro#Hexrays#ReverseEngineeringpic.twitter.com/BuLnKVf8GE
-
IDA Pro 7.4 has been released. Now with Python 3 support, new processor modules, structure editor, decompiler improvements and much more. https://www.hex-rays.com/products/ida/7.4/index.shtml …
#Reversing#Decompiler#IDAPRO#Debuggingpic.twitter.com/0nUJbRZNPT
-
@GHIDRA_RE#Ghidra keeps freezing up on me after about 10 minutes and I don't understand why and can't find any answers. The file browser is also really really really slow. It's driving me crazy because I much prefer Ghidra over#IDAPro for what I am doing. -
Did you enjoy our
#REvil /#Sodinokibi string decryption tutorial ... But you wish we had used#Ghidra instead of#IDAPro
Check out this awesome tutorial from @larsborn
https://blag.nullteilerfrei.de/2020/02/02/defeating-sodinokibi-revil-string-obfuscation-in-ghidra/ … -
Hiring several Reverse Engineers in Annapolis Junction, MD. Candidates please DM or reach out on LinkedIn: Victoria Heck.
#reverseEngineers#idapro#ollydbg#OSCP#parsonscyber#parsons#cybersecjobs#hackers -
#idapro discovery of the day: you can apply structure offsets to a selection of code
select code range, press T, select your structure, be amazed pic.twitter.com/yyypOG0pJa
-
New Tutorial Video
Learn how to automaticaly decrypt #REvil strings with#IDAPro and python
The 4th part in our reverse engineering #ransomware deep-dive series.
https://youtu.be/l2P5CMH9TE0
#OpenAnalysisLive#Malware#tutorials
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.