If your organization has a need for this expertise, please feel free to reach out. A software reverse engineering (SRE) suite of tools developed by NSAs Research Directorate in support of the Cybersecurity mission. RET2 is happy to consult in these spaces, providing plugin development services, the addition of custom features to existing works, or other unique opportunities with regard to security tooling. Our experience developing for these technologies is second to none. It is a developer-oriented plugin designed to aid in the research and development of microcode-based plugins/extensions for the Hex-Rays decompiler. In this post, we presented a new IDA Pro plugin called Lucid. As the initial release, the codebase is a bit messy and the README contains a few known issues/bugs at the time of publication.įinally, there is no regular development scheduled for this plugin (outside of maintenance) but I always welcome external contributions, issues, and feature requests. The code for Lucid is available on github where it has been licensed permissively under the MIT license. Open file src/HexRaysCodeXplorer/PropertySheet.props in notepad (++) and update values of IDADIR and IDASDK paths to point to IDA installation path and IDA7 SDK path accordingly. the C++ nor the IDAPython version has been ported to the latest IDA 7. You can view these individual trees by right clicking an instruction and selecting View subtree. Nevertheless, theres a Hex-Rays plugin called Referee that automatically adds. Viewing the sub-instruction tree of a given microinstruction
0 Comments
Leave a Reply. |