allthingsida
@allthingsida
All things IDA, security, reverse engineering, programming, AI and more. Friend and fan of Hex-Rays but non-official.
Hacked together an IDA Pro MCP server in a few hours tonight! I gave Claude a simple crackme, but forgot to remove the source code from my project folder and in the end it cheated to find the solution🤦♂️ Variable renaming and retyping is implemented though, so that might be…
To date, I have published 15 articles (1045 pages) with the strict goal of helping the cybersecurity community. ERS (439 pages, so far): [+] ERS 05: exploitreversing.com/2025/03/12/exp… [+] ERS 04: exploitreversing.com/2025/02/04/exp… [+] ERS 03: exploitreversing.com/2025/01/22/exp… [+] ERS 02:…
Here are the links to the recordings of my prior two webinars: Debug of Hyper-V, Secure Kernel, VBS Enclaves, Defender, and other secrets: attendee.gotowebinar.com/recording/3590… and Advanced Threat Analysis and Reverse Engineering using AI: attendee.gotowebinar.com/recording/4436…
📢 Calling all #CTF (Capture the Flag) Organizers and Competitors! Hex-Rays is now accepting applications for our Sponsorship Program—and we want to hear from you. Perks include FREE #IDA licenses, exclusive swag, and travel support. For more info, visit: eu1.hubs.ly/H0lZbN20
Looks like a packed release. Good work team!
📣 IDA 9.2 Beta is here! This release is packed with UI upgrades, smarter analysis, and expanded architecture support. ➥ Already a Beta user? Grab it now. ➥ Not enrolled? Sign up today. eu1.hubs.ly/H0lS6nv0
⌛ Let the countdown begin... IDA 9.2 is on the horizon and we thought we'd give you a sneak peek each week until the official launch. eu1.hubs.ly/H0lKYcZ0
Announcing RE//verse 2026! Website is updated with info for sponsors, trainers, speakers, and more importantly, attendees! Are you ready for another year of high quality reverse engineering talks and networking? Join us the first week of March, 2026! re-verse.io
An Introduction to using Artificial Intelligence (AI) for Vulnerability Research x.com/i/broadcasts/1…
A couple more that might be helpful: github.com/taida957789/id… github.com/MxIris-Reverse…
Here we can see @AnthropicAI's claude (Sonnet 3.7 model) talking to IDA pro to reverse engineer a CTF task I made for @PotluckCTF, it does pretty well! It manages to get a grasp of the entire custom VM instruction set, file format, syscall interface etc.🤓 The MCP server is…
Claude reversing a binary using Binary Ninja via MCP while I get a snack @bl4sty @ziyadedher @vector35
who's building the IDA Pro MCP? "please annotate the shit out of this monolithic 64MiB firmware binary while I get some coffee, will ya?"
I've released a new tool "PyClassInformer". It detects vftables in a program compiled with MSVC++ by parsing RTTI. It is written in pure python. So, it runs on MacOS and Linux as well as Windows. #cpp, #vftable, #RTTI, #IDA, #IDAPython, #ReverseEngineering github.com/herosi/PyClass…
Full list here: plugins.hex-rays.com/contest2024/
We are thrilled to announce the winners of the 2024 Hex-Rays Plugin Contest! 🥇1st Place: hrtng 🥈2nd Place: aiDAPal 🥉3rd Place: idalib Rust bindings Check out our reviews of the winners and other notable submissions here: eu1.hubs.ly/H0gRDRn0 Huge thank you to all…