<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[PwnForums - Reverse Engineering]]></title>
		<link>https://pwnforums.st/</link>
		<description><![CDATA[PwnForums - https://pwnforums.st]]></description>
		<pubDate>Sat, 04 Apr 2026 21:20:18 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[[2026] PACK Reverse Engineering]]></title>
			<link>https://pwnforums.st/Thread-2026-PACK-Reverse-Engineering</link>
			<pubDate>Tue, 03 Feb 2026 19:40:34 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=698737">Spearr</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-2026-PACK-Reverse-Engineering</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fimagesend.fr%2Fuploads%2F20260203%2Fa1e43732f1cdb3d87f98f71acbd53600cdf712bb.txt" loading="lazy"  alt="[Image: a1e43732f1cdb3d87f98f71acbd53600cdf712bb.txt]" class="mycode_img" /><br />
Hey BreachForums Community !</span></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Here is a <span style="font-weight: bold;" class="mycode_b">complete</span> package for<span style="font-weight: bold;" class="mycode_b"> Reverse Engineering</span> that I <span style="font-weight: bold;" class="mycode_b">created.</span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">I was able to gather : <span style="font-weight: bold;" class="mycode_b">Ebook</span> / <span style="font-weight: bold;" class="mycode_b">Private Course</span> / <span style="font-weight: bold;" class="mycode_b">Paid App on Reverse Engineering</span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Thank you for your <span style="font-weight: bold;" class="mycode_b">support </span>for more leaks... :] !</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Author of Leak : </span><span style="font-weight: bold;" class="mycode_b"><span style="color: #2ecc40;" class="mycode_color">Spear</span></span></div>
<div style="text-align: center;" class="mycode_align"><hr class="mycode_hr" />
</div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">Pack (List) :</span></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">-</span> Ebook (<span style="font-weight: bold;" class="mycode_b">50+</span>)</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">-</span> Cours</span><span style="color: #ffffff;" class="mycode_color">e </span><span style="color: #ffffff;" class="mycode_color">(</span><span style="font-weight: bold;" class="mycode_b"><span style="color: #ffffff;" class="mycode_color">15+</span></span><span style="color: #ffffff;" class="mycode_color">)</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">-</span> App (<span style="font-weight: bold;" class="mycode_b">4+</span>)</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Size -<span style="font-weight: bold;" class="mycode_b"> 44.7GB</span></span></div>
<div style="text-align: center;" class="mycode_align"><hr class="mycode_hr" />
</div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size">Download Reverse Engineering Pack</span></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">Proof </span>: <a href="https://imagesend.fr/uploads/20260203/132144726d84d2aa41b217b4750113778e372d1f.png" target="_blank" rel="noopener" class="mycode_url">Reverse Engineering Proof</a></span></div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fimagesend.fr%2Fuploads%2F20260203%2Fa1e43732f1cdb3d87f98f71acbd53600cdf712bb.txt" loading="lazy"  alt="[Image: a1e43732f1cdb3d87f98f71acbd53600cdf712bb.txt]" class="mycode_img" /><br />
Hey BreachForums Community !</span></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Here is a <span style="font-weight: bold;" class="mycode_b">complete</span> package for<span style="font-weight: bold;" class="mycode_b"> Reverse Engineering</span> that I <span style="font-weight: bold;" class="mycode_b">created.</span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">I was able to gather : <span style="font-weight: bold;" class="mycode_b">Ebook</span> / <span style="font-weight: bold;" class="mycode_b">Private Course</span> / <span style="font-weight: bold;" class="mycode_b">Paid App on Reverse Engineering</span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Thank you for your <span style="font-weight: bold;" class="mycode_b">support </span>for more leaks... :] !</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Author of Leak : </span><span style="font-weight: bold;" class="mycode_b"><span style="color: #2ecc40;" class="mycode_color">Spear</span></span></div>
<div style="text-align: center;" class="mycode_align"><hr class="mycode_hr" />
</div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">Pack (List) :</span></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">-</span> Ebook (<span style="font-weight: bold;" class="mycode_b">50+</span>)</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">-</span> Cours</span><span style="color: #ffffff;" class="mycode_color">e </span><span style="color: #ffffff;" class="mycode_color">(</span><span style="font-weight: bold;" class="mycode_b"><span style="color: #ffffff;" class="mycode_color">15+</span></span><span style="color: #ffffff;" class="mycode_color">)</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">-</span> App (<span style="font-weight: bold;" class="mycode_b">4+</span>)</span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Size -<span style="font-weight: bold;" class="mycode_b"> 44.7GB</span></span></div>
<div style="text-align: center;" class="mycode_align"><hr class="mycode_hr" />
</div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: medium;" class="mycode_size">Download Reverse Engineering Pack</span></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">Proof </span>: <a href="https://imagesend.fr/uploads/20260203/132144726d84d2aa41b217b4750113778e372d1f.png" target="_blank" rel="noopener" class="mycode_url">Reverse Engineering Proof</a></span></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[IDA PRO 9.2 Cracked With Keygen]]></title>
			<link>https://pwnforums.st/Thread-IDA-PRO-9-2-Cracked-With-Keygen</link>
			<pubDate>Thu, 15 Jan 2026 08:51:32 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=703367">LeetIDA</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-IDA-PRO-9-2-Cracked-With-Keygen</guid>
			<description><![CDATA[<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fq3Ncd4QH%2FD16-FBD81-3623-4462-B736-CB415-ACF22-EA.png" loading="lazy"  alt="[Image: D16-FBD81-3623-4462-B736-CB415-ACF22-EA.png]" class="mycode_img" /><br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2Fq3Ncd4QH%2FD16-FBD81-3623-4462-B736-CB415-ACF22-EA.png" loading="lazy"  alt="[Image: D16-FBD81-3623-4462-B736-CB415-ACF22-EA.png]" class="mycode_img" /><br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Binary Ninja v5.2.8722 Personal]]></title>
			<link>https://pwnforums.st/Thread-Binary-Ninja-v5-2-8722-Personal</link>
			<pubDate>Sun, 11 Jan 2026 19:43:41 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=153642">arsium</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Binary-Ninja-v5-2-8722-Personal</guid>
			<description><![CDATA[Enjoy my boys ! <br />
<br />
<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.postimg.cc%2FnhCWQ6Kd%2FBN.jpg" loading="lazy"  alt="[Image: BN.jpg]" class="mycode_img" /><br />
<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[Enjoy my boys ! <br />
<br />
<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.postimg.cc%2FnhCWQ6Kd%2FBN.jpg" loading="lazy"  alt="[Image: BN.jpg]" class="mycode_img" /><br />
<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[craxrat v7.6 source]]></title>
			<link>https://pwnforums.st/Thread-craxrat-v7-6-source</link>
			<pubDate>Sat, 12 Apr 2025 19:30:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=430478">nullvex</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-craxrat-v7-6-source</guid>
			<description><![CDATA[here is the source code for <span style="color: #eeeeee;" class="mycode_color">craxrat v7.6</span> a (<span style="font-style: italic;" class="mycode_i">remote administration tool</span>)<br />
*disclaimer this is not my doing i just wanted to share.<br />
<br />
<a href="https://gofile.io/d/czVGjk" target="_blank" rel="noopener" class="mycode_url"><span style="color: #ffffff;" class="mycode_color"><span style="font-style: italic;" class="mycode_i">https://gofile.io/d/czVGjk</span></span></a><br />
<hr class="mycode_hr" />
<br />
it was leaked by <span style="color: #ffffff;" class="mycode_color"><dvz_me_placeholder id="0" /> <dvz_me_placeholder id="1" /></span><br />
so yea do whatever with it.<br />
<br />
i haven't gone trough the code completely so i would <br />
when compiling or running it use a vm just to be safe.<br />
<br />
have fun with it.]]></description>
			<content:encoded><![CDATA[here is the source code for <span style="color: #eeeeee;" class="mycode_color">craxrat v7.6</span> a (<span style="font-style: italic;" class="mycode_i">remote administration tool</span>)<br />
*disclaimer this is not my doing i just wanted to share.<br />
<br />
<a href="https://gofile.io/d/czVGjk" target="_blank" rel="noopener" class="mycode_url"><span style="color: #ffffff;" class="mycode_color"><span style="font-style: italic;" class="mycode_i">https://gofile.io/d/czVGjk</span></span></a><br />
<hr class="mycode_hr" />
<br />
it was leaked by <span style="color: #ffffff;" class="mycode_color"><dvz_me_placeholder id="0" /> <dvz_me_placeholder id="1" /></span><br />
so yea do whatever with it.<br />
<br />
i haven't gone trough the code completely so i would <br />
when compiling or running it use a vm just to be safe.<br />
<br />
have fun with it.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Enhance the Dragon with AI for your RE (GhidraMCP)]]></title>
			<link>https://pwnforums.st/Thread-Enhance-the-Dragon-with-AI-for-your-RE-GhidraMCP</link>
			<pubDate>Thu, 27 Mar 2025 02:20:00 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=243328">argue</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Enhance-the-Dragon-with-AI-for-your-RE-GhidraMCP</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><div style="text-align: left;" class="mycode_align">Most RE heads and other types of individuals already know about this tool. But for others who may stumble upon this thread searching for answers or  want to get into RE, this can help enhance your ability. At the very least, just another tool to add to the collection.</div>
<br />
<a href="https://github.com/LaurieWired/GhidraMCP" target="_blank" rel="noopener" class="mycode_url">ghidraMCP</a></div>
<br />
Description: ghidraMCP is an Model Context Protocol server for allowing LLMs to autonomously reverse engineer applications. It exposes numerous tools from core Ghidra functionality to MCP clients.]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><div style="text-align: left;" class="mycode_align">Most RE heads and other types of individuals already know about this tool. But for others who may stumble upon this thread searching for answers or  want to get into RE, this can help enhance your ability. At the very least, just another tool to add to the collection.</div>
<br />
<a href="https://github.com/LaurieWired/GhidraMCP" target="_blank" rel="noopener" class="mycode_url">ghidraMCP</a></div>
<br />
Description: ghidraMCP is an Model Context Protocol server for allowing LLMs to autonomously reverse engineer applications. It exposes numerous tools from core Ghidra functionality to MCP clients.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Master IoT Hacking: FREE Full Walkthrough Course Available Now!]]></title>
			<link>https://pwnforums.st/Thread-Master-IoT-Hacking-FREE-Full-Walkthrough-Course-Available-Now</link>
			<pubDate>Sun, 16 Mar 2025 00:27:45 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=430241">fantasticghost</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Master-IoT-Hacking-FREE-Full-Walkthrough-Course-Available-Now</guid>
			<description><![CDATA[Hey there!<br />
<br />
Ever wanted to dive deep into the world of IoT hacking but didn't know where to start? I've got you covered with this presentation that Ive made: it that takes you through the entire process of performing software / hardware reconnaissance, firmware dumping / analysis through reverse engineering, and vulnerability exploitation in a Linksys E1200 router.<br />
<span style="font-weight: bold;" class="mycode_b">Presentation Highlights:</span><ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Comprehensive Walkthrough:</span> From zero to hero, this course covers everything you need to know to hack IoT devices like a pro: from the moment you get your hands on the device to the moment when you become root on the machine. <br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Real-World Scenarios:</span> Learn by doing with a practical example and a real-world case study: you'll perform all the steps that were taken to discover the CVE-2018-3955. No fluff, just pure hacking knowledge.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">I'm available through this thread</span> for any question along the way! :cat_hype:<br />
</li>
</ul>
<br />
In the archive, you get:<ul class="mycode_list"><li>The presentation in PDF format, 25 slides<br />
</li>
<li>All the binaries that you will need to reverse-engineer<br />
</li>
<li>Unfortunately, I can't provide the hardware x)<br />
</li>
</ul>
<br />
If you want the hardware that I used for this:<ul class="mycode_list"><li>A Linksys E1200 router, firmware version &lt;= 2.0.09<br />
</li>
<li>A USB to serial adapter<br />
</li>
<li>A multimeter<br />
</li>
<li>A magnifying glass (optional<br />
</li>
</ul>
<br />
That's my first post, so idk if I should hide the link or not. Ill hide it with 1 credit, and you guys tell me! <br />
Also, if you have a better website on which I could host this, it says my link will expire in 7 days...<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[Hey there!<br />
<br />
Ever wanted to dive deep into the world of IoT hacking but didn't know where to start? I've got you covered with this presentation that Ive made: it that takes you through the entire process of performing software / hardware reconnaissance, firmware dumping / analysis through reverse engineering, and vulnerability exploitation in a Linksys E1200 router.<br />
<span style="font-weight: bold;" class="mycode_b">Presentation Highlights:</span><ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Comprehensive Walkthrough:</span> From zero to hero, this course covers everything you need to know to hack IoT devices like a pro: from the moment you get your hands on the device to the moment when you become root on the machine. <br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Real-World Scenarios:</span> Learn by doing with a practical example and a real-world case study: you'll perform all the steps that were taken to discover the CVE-2018-3955. No fluff, just pure hacking knowledge.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">I'm available through this thread</span> for any question along the way! :cat_hype:<br />
</li>
</ul>
<br />
In the archive, you get:<ul class="mycode_list"><li>The presentation in PDF format, 25 slides<br />
</li>
<li>All the binaries that you will need to reverse-engineer<br />
</li>
<li>Unfortunately, I can't provide the hardware x)<br />
</li>
</ul>
<br />
If you want the hardware that I used for this:<ul class="mycode_list"><li>A Linksys E1200 router, firmware version &lt;= 2.0.09<br />
</li>
<li>A USB to serial adapter<br />
</li>
<li>A multimeter<br />
</li>
<li>A magnifying glass (optional<br />
</li>
</ul>
<br />
That's my first post, so idk if I should hide the link or not. Ill hide it with 1 credit, and you guys tell me! <br />
Also, if you have a better website on which I could host this, it says my link will expire in 7 days...<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[(IDA Free/IDA Pro) Useful Plugins To Get After Installing IDA ⌇ Compiled List]]></title>
			<link>https://pwnforums.st/Thread-IDA-Free-IDA-Pro-Useful-Plugins-To-Get-After-Installing-IDA-%E2%8C%87-Compiled-List</link>
			<pubDate>Thu, 13 Mar 2025 19:15:16 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=57161">Chapo</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-IDA-Free-IDA-Pro-Useful-Plugins-To-Get-After-Installing-IDA-%E2%8C%87-Compiled-List</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">Keypatch:</span></span><br />
<br />
Keypatch is a versatile assembler designed for multiple architectures within IDA Pro. While IDA Pro offers the ability to patch bytes in disassembled binaries, its process can be awkward and inefficient. To address this, Keypatch was developed as a plugin to streamline the experience, making it significantly simpler to modify bytes in IDA Pro.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/keystone-engine/keypatch" target="_blank" rel="noopener" class="mycode_url">https://github.com/keystone-engine/keypatch</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">Patching:</span></span><br />
<br />
Patching is an interactive plugin for binary patching in IDA Pro, built as a slight variation of Keypatch. It relies on the keystone-engine to function and offers a straightforward design, supporting x86_32, x86_64, and ARM architectures. Although it may seem redundant if you already use Keypatch, Patching stands out with a superior interface compared to both IDA Pro and Keypatch. Compact and user-friendly, this plugin can be accessed via the context menu or the Plugins menu.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/gaasedelen/patching" target="_blank" rel="noopener" class="mycode_url">https://github.com/gaasedelen/patching</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">VulChatGPT:</span></span><br />
<br />
VulChatGPT is a HexRays decompiler enhanced with OpenAI (ChatGPT) integration to detect potential vulnerabilities in binary files. Drawing inspiration from Gepetto, VulChatGPT extends its capabilities by introducing a vulnerability-querying feature while retaining Gepetto’s core functionality. It also renames function variables and provides explanations of the decompiled output’s purpose.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/ke0z/VulChatGPT" target="_blank" rel="noopener" class="mycode_url">https://github.com/ke0z/VulChatGPT</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">BinDiff:</span></span><br />
<br />
BinDiff is an open-source utility designed to compare binary files, helping vulnerability researchers and engineers efficiently identify differences and similarities in disassembled code. It operates as a standalone binary diffing tool, but it includes plugins for IDA Pro as well.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/google/bindiff" target="_blank" rel="noopener" class="mycode_url">https://github.com/google/bindiff</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">ScyllaHide:</span></span><br />
<br />
ScyllaHide is a sophisticated usermode tool designed to counter anti-debugging techniques. Many protectors and malware attempt to hook certain Windows APIs to block debugging efforts. This plugin serves as a top-tier solution to thwart such anti-debugging strategies. ScyllaHide offers plugins compatible with IDA Pro and other debuggers, such as x64dbg.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/x64dbg/ScyllaHide" target="_blank" rel="noopener" class="mycode_url">https://github.com/x64dbg/ScyllaHide</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">CAPA:</span></span><br />
<br />
CAPA is a versatile tool capable of analyzing PE, ELF, and shellcode files, producing a clear and practical report that details the input’s behavior—such as whether it requires an HTTP request, internet connection, or could potentially be a backdoor. This makes it highly valuable for malware reverse engineers. The CAPA Explorer plugin for IDA Pro replicates this functionality directly within the IDA Pro environment, relying solely on IDA Pro’s database for analysis. Additionally, CAPA Explorer allows users to create custom rules as needed.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/mandiant/capa" target="_blank" rel="noopener" class="mycode_url">https://github.com/mandiant/capa</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">efiXplorer:</span></span><br />
<br />
efiXplorer is an IDA plugin designed to automate the analysis and reverse engineering of UEFI firmware. Paired with it, efiXloader serves as an IDA Pro loader module that handles the processing of UEFI drivers within a single IDA Pro session. While analyzing UEFI drivers, efiXloader detects the entry point of each driver.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/binarly-io/efiXplorer" target="_blank" rel="noopener" class="mycode_url">https://github.com/binarly-io/efiXplorer</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">ComIDA:</span></span><br />
<br />
ComIDA is an IDA plugin that aids in analyzing modules utilizing COM. It functions by identifying data references to recognized COM GUIDs (Classes or Interfaces) and, for users of the Hex-Rays plugin, deduces the types associated with specific functions/methods, including:<br />
<br />
<div class="codeblock"><div class="body" dir="ltr"><code>CoCreateInstance</code></div></div><div class="codeblock"><div class="body" dir="ltr"><code>CoGetCallContext</code></div></div><div class="codeblock"><div class="body" dir="ltr"><code>QueryInterface</code></div></div><br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/airbus-cert/comida" target="_blank" rel="noopener" class="mycode_url">https://github.com/airbus-cert/comida</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">ClassInformer:</span></span><br />
<br />
ClassInformer is an IDA Pro plugin designed to locate, name, repair, and list class virtual function tables (vftables). It assists reverse engineers in identifying virtual function tables and, despite being an older plugin, remains compatible with the latest versions of IDA Pro.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/herosi/classinformer" target="_blank" rel="noopener" class="mycode_url">https://github.com/herosi/classinformer</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">OllyDumpEx:</span></span><br />
<br />
OllyDumpEx is an improved version of the OllyDump plugin, developed by its author to support multiple tools, including OllyDbg, Immunity Debugger, and IDA Pro. This plugin serves as a process memory dumper for debuggers and includes support for native 64-bit processes across tools like IDA Pro, WinDbg, and x64dbg. It also automatically computes various parameters, such as RawSize, RawOffset, VirtualOffset, and more.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://low-priority.appspot.com/ollydumpex/" target="_blank" rel="noopener" class="mycode_url">https://low-priority.appspot.com/ollydumpex/</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">SmartJump:</span></span><br />
<br />
SmartJump is a plugin that upgrades the functionality of IDA Pro's JumpAsk g command. When activated, it allows users to navigate to labels or names in addition to standard jumps. By using brackets, you can also jump to memory addresses referenced within the code.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/PwCUK-CTO/SmartJump" target="_blank" rel="noopener" class="mycode_url">https://github.com/PwCUK-CTO/SmartJump</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">HexRaysPyTools:</span></span><br />
<br />
HexRaysPyTools is an IDA Pro plugin that enhances the HexRays decompiler experience by streamlining the reconstruction of structures and classes. It supports the identification of virtual tables and the creation of classes and structures. Additionally, it speeds up the transformation of decompiler output and enables tasks that would otherwise be unfeasible.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/igogo-x86/HexRaysPyTools" target="_blank" rel="noopener" class="mycode_url">https://github.com/igogo-x86/HexRaysPyTools</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">Yagi:</span></span><br />
<br />
Yagi is an IDA plugin which includes the Ghidra decompilers into both IDA Pro and IDA Free. After installing it, you can use the F3 key to use the plugin.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/airbus-cert/Yagi" target="_blank" rel="noopener" class="mycode_url">https://github.com/airbus-cert/Yagi</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">IDAFuzzy:</span></span><br />
<br />
IDAFuzzy is a fuzzy search utility for IDA Pro that assists in locating commands, functions, structures, and more. It’s particularly helpful when you can’t recall exact shortcuts, function names, or structure names, making navigation and discovery easier.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/HongThatCong/IDAFuzzy" target="_blank" rel="noopener" class="mycode_url">https://github.com/HongThatCong/IDAFuzzy</a></span></div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">Keypatch:</span></span><br />
<br />
Keypatch is a versatile assembler designed for multiple architectures within IDA Pro. While IDA Pro offers the ability to patch bytes in disassembled binaries, its process can be awkward and inefficient. To address this, Keypatch was developed as a plugin to streamline the experience, making it significantly simpler to modify bytes in IDA Pro.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/keystone-engine/keypatch" target="_blank" rel="noopener" class="mycode_url">https://github.com/keystone-engine/keypatch</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">Patching:</span></span><br />
<br />
Patching is an interactive plugin for binary patching in IDA Pro, built as a slight variation of Keypatch. It relies on the keystone-engine to function and offers a straightforward design, supporting x86_32, x86_64, and ARM architectures. Although it may seem redundant if you already use Keypatch, Patching stands out with a superior interface compared to both IDA Pro and Keypatch. Compact and user-friendly, this plugin can be accessed via the context menu or the Plugins menu.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/gaasedelen/patching" target="_blank" rel="noopener" class="mycode_url">https://github.com/gaasedelen/patching</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">VulChatGPT:</span></span><br />
<br />
VulChatGPT is a HexRays decompiler enhanced with OpenAI (ChatGPT) integration to detect potential vulnerabilities in binary files. Drawing inspiration from Gepetto, VulChatGPT extends its capabilities by introducing a vulnerability-querying feature while retaining Gepetto’s core functionality. It also renames function variables and provides explanations of the decompiled output’s purpose.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/ke0z/VulChatGPT" target="_blank" rel="noopener" class="mycode_url">https://github.com/ke0z/VulChatGPT</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">BinDiff:</span></span><br />
<br />
BinDiff is an open-source utility designed to compare binary files, helping vulnerability researchers and engineers efficiently identify differences and similarities in disassembled code. It operates as a standalone binary diffing tool, but it includes plugins for IDA Pro as well.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/google/bindiff" target="_blank" rel="noopener" class="mycode_url">https://github.com/google/bindiff</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">ScyllaHide:</span></span><br />
<br />
ScyllaHide is a sophisticated usermode tool designed to counter anti-debugging techniques. Many protectors and malware attempt to hook certain Windows APIs to block debugging efforts. This plugin serves as a top-tier solution to thwart such anti-debugging strategies. ScyllaHide offers plugins compatible with IDA Pro and other debuggers, such as x64dbg.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/x64dbg/ScyllaHide" target="_blank" rel="noopener" class="mycode_url">https://github.com/x64dbg/ScyllaHide</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">CAPA:</span></span><br />
<br />
CAPA is a versatile tool capable of analyzing PE, ELF, and shellcode files, producing a clear and practical report that details the input’s behavior—such as whether it requires an HTTP request, internet connection, or could potentially be a backdoor. This makes it highly valuable for malware reverse engineers. The CAPA Explorer plugin for IDA Pro replicates this functionality directly within the IDA Pro environment, relying solely on IDA Pro’s database for analysis. Additionally, CAPA Explorer allows users to create custom rules as needed.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/mandiant/capa" target="_blank" rel="noopener" class="mycode_url">https://github.com/mandiant/capa</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">efiXplorer:</span></span><br />
<br />
efiXplorer is an IDA plugin designed to automate the analysis and reverse engineering of UEFI firmware. Paired with it, efiXloader serves as an IDA Pro loader module that handles the processing of UEFI drivers within a single IDA Pro session. While analyzing UEFI drivers, efiXloader detects the entry point of each driver.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/binarly-io/efiXplorer" target="_blank" rel="noopener" class="mycode_url">https://github.com/binarly-io/efiXplorer</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">ComIDA:</span></span><br />
<br />
ComIDA is an IDA plugin that aids in analyzing modules utilizing COM. It functions by identifying data references to recognized COM GUIDs (Classes or Interfaces) and, for users of the Hex-Rays plugin, deduces the types associated with specific functions/methods, including:<br />
<br />
<div class="codeblock"><div class="body" dir="ltr"><code>CoCreateInstance</code></div></div><div class="codeblock"><div class="body" dir="ltr"><code>CoGetCallContext</code></div></div><div class="codeblock"><div class="body" dir="ltr"><code>QueryInterface</code></div></div><br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/airbus-cert/comida" target="_blank" rel="noopener" class="mycode_url">https://github.com/airbus-cert/comida</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">ClassInformer:</span></span><br />
<br />
ClassInformer is an IDA Pro plugin designed to locate, name, repair, and list class virtual function tables (vftables). It assists reverse engineers in identifying virtual function tables and, despite being an older plugin, remains compatible with the latest versions of IDA Pro.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/herosi/classinformer" target="_blank" rel="noopener" class="mycode_url">https://github.com/herosi/classinformer</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">OllyDumpEx:</span></span><br />
<br />
OllyDumpEx is an improved version of the OllyDump plugin, developed by its author to support multiple tools, including OllyDbg, Immunity Debugger, and IDA Pro. This plugin serves as a process memory dumper for debuggers and includes support for native 64-bit processes across tools like IDA Pro, WinDbg, and x64dbg. It also automatically computes various parameters, such as RawSize, RawOffset, VirtualOffset, and more.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://low-priority.appspot.com/ollydumpex/" target="_blank" rel="noopener" class="mycode_url">https://low-priority.appspot.com/ollydumpex/</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">SmartJump:</span></span><br />
<br />
SmartJump is a plugin that upgrades the functionality of IDA Pro's JumpAsk g command. When activated, it allows users to navigate to labels or names in addition to standard jumps. By using brackets, you can also jump to memory addresses referenced within the code.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/PwCUK-CTO/SmartJump" target="_blank" rel="noopener" class="mycode_url">https://github.com/PwCUK-CTO/SmartJump</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">HexRaysPyTools:</span></span><br />
<br />
HexRaysPyTools is an IDA Pro plugin that enhances the HexRays decompiler experience by streamlining the reconstruction of structures and classes. It supports the identification of virtual tables and the creation of classes and structures. Additionally, it speeds up the transformation of decompiler output and enables tasks that would otherwise be unfeasible.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/igogo-x86/HexRaysPyTools" target="_blank" rel="noopener" class="mycode_url">https://github.com/igogo-x86/HexRaysPyTools</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">Yagi:</span></span><br />
<br />
Yagi is an IDA plugin which includes the Ghidra decompilers into both IDA Pro and IDA Free. After installing it, you can use the F3 key to use the plugin.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/airbus-cert/Yagi" target="_blank" rel="noopener" class="mycode_url">https://github.com/airbus-cert/Yagi</a></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #eeeeee;" class="mycode_color">IDAFuzzy:</span></span><br />
<br />
IDAFuzzy is a fuzzy search utility for IDA Pro that assists in locating commands, functions, structures, and more. It’s particularly helpful when you can’t recall exact shortcuts, function names, or structure names, making navigation and discovery easier.<br />
<br />
Link: <span style="color: #eeeeee;" class="mycode_color"><a href="https://github.com/HongThatCong/IDAFuzzy" target="_blank" rel="noopener" class="mycode_url">https://github.com/HongThatCong/IDAFuzzy</a></span></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Games Reverse Engineering]]></title>
			<link>https://pwnforums.st/Thread-Games-Reverse-Engineering</link>
			<pubDate>Thu, 13 Mar 2025 17:40:40 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=427997">dothel</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Games-Reverse-Engineering</guid>
			<description><![CDATA[Hi guys i'm start studies in reverse engineering, any recommend tool to reverse engineering in games?]]></description>
			<content:encoded><![CDATA[Hi guys i'm start studies in reverse engineering, any recommend tool to reverse engineering in games?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Crypto]]></title>
			<link>https://pwnforums.st/Thread-Crypto--166251</link>
			<pubDate>Sat, 22 Feb 2025 03:09:25 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=408547">LizzysETH</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Crypto--166251</guid>
			<description><![CDATA[need 3-4, preferably 3 since i have my self and 2 others, cant disclose to much information publicly but 7 figure opportunity. everything is 50%! pm me on here verify yourself with me and we can get to business. EDUCATIONAL PURPOSES OF COURSE XD]]></description>
			<content:encoded><![CDATA[need 3-4, preferably 3 since i have my self and 2 others, cant disclose to much information publicly but 7 figure opportunity. everything is 50%! pm me on here verify yourself with me and we can get to business. EDUCATIONAL PURPOSES OF COURSE XD]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Ida Pro 9.0 Crack with Video Tutorial for Windows]]></title>
			<link>https://pwnforums.st/Thread-Ida-Pro-9-0-Crack-with-Video-Tutorial-for-Windows</link>
			<pubDate>Fri, 21 Feb 2025 01:46:12 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=395666">kraber</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Ida-Pro-9-0-Crack-with-Video-Tutorial-for-Windows</guid>
			<description><![CDATA[<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fimgur.com%2Fa%2Fa80xR8I" loading="lazy"  alt="[Image: a80xR8I]" class="mycode_img" /> <br />
IDA PRO 9.0.241217 SP Crack<br />
<br />
Year/Release Date : 2024 <br />
Version : 9.0 Build 241217 <br />
Developer : Hex-Rays SA <br />
Developer's website : <a href="https://hex-rays.com/" target="_blank" rel="noopener" class="mycode_url">https://hex-rays.com/</a> <br />
Bit depth : 64bit Interface language : <br />
English Tablet : present <br />
<br />
Compatible for Windows / Mac / Linux and includes SDK and utilities<br />
<br />
p.s i didnt crack this<br />
<hr class="mycode_hr" />
<br />
Included in this post is the magnet link as well as a 3 minute video tutorial with English Subtitles going through the process on how to administer the patch.<br />
<br />
Disclaimer : The video is only a tutorial for the windows patch however the process is similar for other operating systems.<br />
<br />
The video tutorial is an .mp4 thats uploaded in a mega link below.<br />
<hr class="mycode_hr" />
System requirements : <br />
<br />
Windows currently supported x64 OS required (Windows 8 or later, Windows 11 or higher recommended). <br />
Linux x64 (x86_64) <br />
CentOS 7 or later<br />
Ubuntu 16.04 or later<br />
Other equivalent distributions may work but not guaranteed. OS X macOS 12 (Monterey) or later (x64 or ARM64).<br />
<br />
<hr class="mycode_hr" />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fimgur.com%2Fa%2Fa80xR8I" loading="lazy"  alt="[Image: a80xR8I]" class="mycode_img" /> <br />
IDA PRO 9.0.241217 SP Crack<br />
<br />
Year/Release Date : 2024 <br />
Version : 9.0 Build 241217 <br />
Developer : Hex-Rays SA <br />
Developer's website : <a href="https://hex-rays.com/" target="_blank" rel="noopener" class="mycode_url">https://hex-rays.com/</a> <br />
Bit depth : 64bit Interface language : <br />
English Tablet : present <br />
<br />
Compatible for Windows / Mac / Linux and includes SDK and utilities<br />
<br />
p.s i didnt crack this<br />
<hr class="mycode_hr" />
<br />
Included in this post is the magnet link as well as a 3 minute video tutorial with English Subtitles going through the process on how to administer the patch.<br />
<br />
Disclaimer : The video is only a tutorial for the windows patch however the process is similar for other operating systems.<br />
<br />
The video tutorial is an .mp4 thats uploaded in a mega link below.<br />
<hr class="mycode_hr" />
System requirements : <br />
<br />
Windows currently supported x64 OS required (Windows 8 or later, Windows 11 or higher recommended). <br />
Linux x64 (x86_64) <br />
CentOS 7 or later<br />
Ubuntu 16.04 or later<br />
Other equivalent distributions may work but not guaranteed. OS X macOS 12 (Monterey) or later (x64 or ARM64).<br />
<br />
<hr class="mycode_hr" />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Telegram bot source code]]></title>
			<link>https://pwnforums.st/Thread-Telegram-bot-source-code</link>
			<pubDate>Thu, 13 Feb 2025 03:19:09 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=395288">Shdusuchcisn</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Telegram-bot-source-code</guid>
			<description><![CDATA[I need help getting a telegram bot source for and changing it. Plz pm me on telegram <dvz_me_placeholder id="2" />]]></description>
			<content:encoded><![CDATA[I need help getting a telegram bot source for and changing it. Plz pm me on telegram <dvz_me_placeholder id="2" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[ida pro 9 leak]]></title>
			<link>https://pwnforums.st/Thread-ida-pro-9-leak</link>
			<pubDate>Sun, 09 Feb 2025 22:10:09 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=357972">Smeforlean</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-ida-pro-9-leak</guid>
			<description><![CDATA[source - <a href="http://fckilfkscwusoopguhi7i6yg3l6tknaz7lrumvlhg5mvtxzxbbxlimid.onion/" target="_blank" rel="noopener" class="mycode_url">http://fckilfkscwusoopguhi7i6yg3l6tknaz7...mid.onion/</a><br />
<a href="https://mega.nz/folder/4u00ESLK#TT9j6XqJaabCjOQioGDRkQ" target="_blank" rel="noopener" class="mycode_url">https://mega.nz/folder/4u00ESLK#TT9j6XqJaabCjOQioGDRkQ</a><br />
Instructions in the file:<br />
<br />
<span style="color: #c1bcb4;" class="mycode_color">Download <a href="https://github.com/WerWolv/ImHex" target="_blank" rel="noopener" class="mycode_url">https://github.com/WerWolv/ImHex</a> </span><br />
To make the fake key work, apply the following patches (Windows only):<br />
<br />
Open the DLL file in the Hex Editor<br />
Open it ida.dll (for the 32-bit version) or ida64.dll (for the 64-bit version) in the hex editor.<br />
Find the address<br />
<br />
Use the "Go to address" or "Find address" function in your hex editor (usually in the "Search" or "Navigation" menu). <br />
<br />
For the 32-bit version of the program:<br />
<br />
File: ida.dll<br />
<br />
Address: 32B273 <br />
<br />
Patch: Change the bytes at address 32B273 from 74 04 to 90 90<br />
<br />
For the 64-bit version of the program:<br />
<br />
File: ida64.dll<br />
<br />
Address: 342E53 <br />
<br />
Patch: Change the bytes at address 342E53 from 74 04 to 90 90<br />
<br />
Save the changes<br />
<br />
Save the modified DLL file. Make sure you save it back to the original file location by overwriting the original one. ida.dll or ida64.dll .<br />
<br />
You have licensed ida pro 9]]></description>
			<content:encoded><![CDATA[source - <a href="http://fckilfkscwusoopguhi7i6yg3l6tknaz7lrumvlhg5mvtxzxbbxlimid.onion/" target="_blank" rel="noopener" class="mycode_url">http://fckilfkscwusoopguhi7i6yg3l6tknaz7...mid.onion/</a><br />
<a href="https://mega.nz/folder/4u00ESLK#TT9j6XqJaabCjOQioGDRkQ" target="_blank" rel="noopener" class="mycode_url">https://mega.nz/folder/4u00ESLK#TT9j6XqJaabCjOQioGDRkQ</a><br />
Instructions in the file:<br />
<br />
<span style="color: #c1bcb4;" class="mycode_color">Download <a href="https://github.com/WerWolv/ImHex" target="_blank" rel="noopener" class="mycode_url">https://github.com/WerWolv/ImHex</a> </span><br />
To make the fake key work, apply the following patches (Windows only):<br />
<br />
Open the DLL file in the Hex Editor<br />
Open it ida.dll (for the 32-bit version) or ida64.dll (for the 64-bit version) in the hex editor.<br />
Find the address<br />
<br />
Use the "Go to address" or "Find address" function in your hex editor (usually in the "Search" or "Navigation" menu). <br />
<br />
For the 32-bit version of the program:<br />
<br />
File: ida.dll<br />
<br />
Address: 32B273 <br />
<br />
Patch: Change the bytes at address 32B273 from 74 04 to 90 90<br />
<br />
For the 64-bit version of the program:<br />
<br />
File: ida64.dll<br />
<br />
Address: 342E53 <br />
<br />
Patch: Change the bytes at address 342E53 from 74 04 to 90 90<br />
<br />
Save the changes<br />
<br />
Save the modified DLL file. Make sure you save it back to the original file location by overwriting the original one. ida.dll or ida64.dll .<br />
<br />
You have licensed ida pro 9]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Could You Help Me Reverse Engineer a JS-based scheme?]]></title>
			<link>https://pwnforums.st/Thread-Could-You-Help-Me-Reverse-Engineer-a-JS-based-scheme</link>
			<pubDate>Thu, 23 Jan 2025 00:11:29 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=217193">helixhelix</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Could-You-Help-Me-Reverse-Engineer-a-JS-based-scheme</guid>
			<description><![CDATA[Hello!<br />
<br />
So I got a new quest to complete. <br />
<br />
I would be happy to have a text chat or even voice chat where you could give me some insights/the info on how to replicate the stuff in question, but by myself or a coding guy they'd assign me. <br />
<br />
Main things I know at the moment:<br />
 <br />
<ol type="1" class="mycode_list"><li> It's a fully JS based script pack (?) with QR codes generation and/or malicious apks/browser extensions involved as I think <br />
</li>
<li> It's a sketchy crypto scam stuff <br />
</li>
<li> It's on a cloaked domain/short-lived high-effective SEO method, and it's not a google one, the search volume is at minimum compared to google   <br />
</li>
</ol>
<br />
<br />
<span style="font-style: italic;" class="mycode_i">If you are confident with your skills, I hope you got some rep on the site and that you are not a newly registered nor an empty account.<br />
</span><br />
Please, write me at PM, I will show you the link(s) I am interested in to analyze/replicate and gain some info from. I will be able to pay in crypto for such consultation of course. Drop your prices with the PM too. <br />
<br />
Of course I would gladly accept all the pieces of advice regarding JS scams in the comments (maybe the thing I am trying to is easily reachable without any consulting/teaching, who knows..), is it even a viable option nowadays though?]]></description>
			<content:encoded><![CDATA[Hello!<br />
<br />
So I got a new quest to complete. <br />
<br />
I would be happy to have a text chat or even voice chat where you could give me some insights/the info on how to replicate the stuff in question, but by myself or a coding guy they'd assign me. <br />
<br />
Main things I know at the moment:<br />
 <br />
<ol type="1" class="mycode_list"><li> It's a fully JS based script pack (?) with QR codes generation and/or malicious apks/browser extensions involved as I think <br />
</li>
<li> It's a sketchy crypto scam stuff <br />
</li>
<li> It's on a cloaked domain/short-lived high-effective SEO method, and it's not a google one, the search volume is at minimum compared to google   <br />
</li>
</ol>
<br />
<br />
<span style="font-style: italic;" class="mycode_i">If you are confident with your skills, I hope you got some rep on the site and that you are not a newly registered nor an empty account.<br />
</span><br />
Please, write me at PM, I will show you the link(s) I am interested in to analyze/replicate and gain some info from. I will be able to pay in crypto for such consultation of course. Drop your prices with the PM too. <br />
<br />
Of course I would gladly accept all the pieces of advice regarding JS scams in the comments (maybe the thing I am trying to is easily reachable without any consulting/teaching, who knows..), is it even a viable option nowadays though?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Reverse Engineering: A Comprehensive Guide]]></title>
			<link>https://pwnforums.st/Thread-Reverse-Engineering-A-Comprehensive-Guide</link>
			<pubDate>Tue, 21 Jan 2025 22:23:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=49680">Blue_Hawk</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Reverse-Engineering-A-Comprehensive-Guide</guid>
			<description><![CDATA[]]></description>
			<content:encoded><![CDATA[]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Reverse Engineering Beginner Book]]></title>
			<link>https://pwnforums.st/Thread-Reverse-Engineering-Beginner-Book</link>
			<pubDate>Tue, 14 Jan 2025 05:49:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=312259">mt01</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Reverse-Engineering-Beginner-Book</guid>
			<description><![CDATA[A well-known book for starting reverse engineering for beginners<br />
<br />
<a href="https://archive.org/download/ReverseEngineeringForBeginnersEn/Reverse_Engineering_for_Beginners-en.pdf" target="_blank" rel="noopener" class="mycode_url">https://archive.org/download/ReverseEngi...ers-en.pdf</a>]]></description>
			<content:encoded><![CDATA[A well-known book for starting reverse engineering for beginners<br />
<br />
<a href="https://archive.org/download/ReverseEngineeringForBeginnersEn/Reverse_Engineering_for_Beginners-en.pdf" target="_blank" rel="noopener" class="mycode_url">https://archive.org/download/ReverseEngi...ers-en.pdf</a>]]></content:encoded>
		</item>
	</channel>
</rss>