I've updated my #VulnerabilityResearch and #ReverseEngineering tools to use the latest version of @binarly_io award-winning #idalib #Rust bindings, which support @HexRaysSA IDA Pro 9.2 and their freshly open-sourced SDK.

#Rhabdomancer - Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.
https://github.com/0xdea/rhabdomancer

#Haruspex - Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.
https://github.com/0xdea/haruspex

#Augur - Reverse engineering assistant that extracts strings and related pseudo-code from a binary file.
https://github.com/0xdea/augur

For additional details:
https://security.humanativaspa.it/streamlining-vulnerability-research-with-ida-pro-and-rust/

GitHub - 0xdea/rhabdomancer: Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.

Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file. - 0xdea/rhabdomancer

GitHub
4 Powerful Applications of IDALib: Headless IDA in Action

Discover four powerful ways to use idalib, IDA Pro’s headless automation interface, for scalable reverse engineering, CI integration, and more.

I've just updated my #Rust crates!

https://crates.io/users/0xdea

Most notably, my vulnerability research tools based on @binarly_io's #idalib have been updated to use the new idalib v0.6. Cheers 🍻

crates.io: Rust Package Registry

My idalib-based "vulnerability divination" tool suite is finally available in the official Hex-Rays Plugins & Apps repository! 🦀

https://plugins.hex-rays.com/search-results?search_term=0xdea

#idapro #idalib #vulnerabilityresearch
#reverseengineering

Hex-Rays - Plugins & Apps

Your description here